Author of the publication

A Framework for Efficient Storage Security in RDBMS.

, , , , and . EDBT, volume 2992 of Lecture Notes in Computer Science, page 147-164. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication and integrity in outsourced databases., , and . ACM Trans. Storage, 2 (2): 107-138 (2006)Improving secure server performance by re-balancing SSL/TLS handshakes., , and . AsiaCCS, page 26-34. ACM, (2006)Efficient and provably secure aggregation of encrypted data in wireless sensor networks., , , and . ACM Trans. Sens. Networks, 5 (3): 20:1-20:36 (2009)Signature Bouquets: Immutability for Aggregated/Condensed Signatures., , and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 160-176. Springer, (2004)E.cient Aggregation of encrypted data in Wireless Sensor Networks., , and . MobiQuitous, page 109-117. IEEE Computer Society, (2005)Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes., , and . IACR Cryptology ePrint Archive, (2005)Efficient Aggregation of encrypted data in Wireless Sensor Networks, , and . Mobile and Ubiquitous Systems: Networking and Services, (2005)Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks, , and . IEEE International Conference on Communications, Istanbul, Turkey, ICC2006, (June 2006)On Security of Sovereign Joins., and . IACR Cryptology ePrint Archive, (2006)Aggregation Queries in the Database-As-a-Service Model., and . DBSec, volume 4127 of Lecture Notes in Computer Science, page 89-103. Springer, (2006)