참고문헌
- 윤인하, "최근 미국 동부지역의 정전사태와 미국 전력 사업의 문제점", Aisa-Pacific Review, 2003.
- D. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searching on Encrypted Data," IEEE Symp. on Security and Privacy, May 2000.
- E.J. Goh, "Secure Indexes," Technical Report 2003/216, IACR ePrint Crpytography Archive, June 2003.
- P. Golle, J. Staddon, and B. Waters, "Secure Conjunctive Keyword Search over Encrypted Data," In Applied Cryptography and Network Security Conference, June 2004.
- D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," Eurocrypt 2004, May 2004.
- J. Katz, A. Sahai, and B. Waters, "Predicate Encryption Supporting Disjunctions," EUROCRYPT 2008, LNCS 4965, pp. 146-162, 2008.
- Gulteckin Ozsoyoglu, David Singer, "Anti-tamper Database: Querying Encrypted Databases," In Proc. of the 17th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Estes Park, Colorado, August 2003.
- R. Agrawal, J. Kiernan, R. Srikant, Y. Xu, "Order Preserving Encryption for Numeric Data," In Proc. of the ACM SIGMOD Conf. on Management of Data, Paris, France June 2004.
- H. Hacigümü , B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database- service-provider model," ACM SIGMOD, 2002.
- E. Damiani, S.D.C.di Vimercati, S. Jajodia, S. Paraboshi and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSS," In Proc. of the 10th ACM Conf. on Computer and Communications Security(CCS), October 2003.
- A. Ceselli, E. Damiani, S.D.C.D Vimercati, S. Jajoda, S. Paraboschi and P. Samarati, "Modeling and Assessing Inference Exposure in Encrypted Database," ACM Transactions on Information and System Security, Vol.8, No.1, Feb. 2005.
- L. Liu, J. Gai, "Bloom Filter Based Index for Query over Encrypted Character Strings in Database," csie, vol. 1, pp.303-307, 2009 WRI World Congress on Computer Science and Information Engineering, 2009.
- L. Liu and J. Gai, "A Method Query over Encrypted Data in Database," ICCET, Volume 01, pages 23-27, 2009.
- M. Mitzenmacher. "Compressed Bloom Filter," IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp. 604-612 December 2002. https://doi.org/10.1109/TNET.2002.803864
- D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO 2001, August 2001.