Two can keep a secret: A distributed architecture for secure database services, Proc. of CIDR 2005, 2005. ,
Combining Consistency and Confidentiality Requirements in First-Order Databases, Proc. of ISC, 2009. ,
DOI : 10.1007/978-3-540-74835-9_12
Graph-Based Algorithms for Boolean Function Manipulation, IEEE Transactions on Computers, vol.35, issue.8, pp.677-691, 1986. ,
DOI : 10.1109/TC.1986.1676819
Privacy-preserving multi-keyword ranked search over encrypted cloud data, Proc. of INFOCOM 2011, 2011. ,
DOI : 10.1109/tpds.2013.45
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System, 2008 Annual Computer Security Applications Conference (ACSAC), 2008. ,
DOI : 10.1109/ACSAC.2008.13
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases, 2009 29th IEEE International Conference on Distributed Computing Systems, 2009. ,
DOI : 10.1109/ICDCS.2009.52
Keep a Few: Outsourcing Data While Maintaining Confidentiality, Proc. of ESORICS, 2009. ,
DOI : 10.1145/1994.2209
Combining fragmentation and encryption to protect privacy in data storage, ACM Transactions on Information and System Security, vol.13, issue.3, pp.1-2233, 2010. ,
DOI : 10.1145/1805974.1805978
Balancing confidentiality and efficiency in untrusted relational DBMSs, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948124
Fragments and loose associations: Respecting privacy in data publishing, Proc. of the VLDB Endowment, pp.1370-1381, 2010. ,
Accuracy and performance of biometric systems, Proceedings of the 21st IEEE Instrumentation and Measurement Technology Conference (IEEE Cat. No.04CH37510), 2004. ,
DOI : 10.1109/IMTC.2004.1351099
Robust fingerprint detection for access control, Proc. of RoboCare Workshop 2005, 2005. ,
Fast set bounds propagation using a bdd-sat hybrid, J. Artif. Int. Res, vol.38, pp.307-338, 2010. ,
Providing database as a service, Proceedings 18th International Conference on Data Engineering, 2002. ,
DOI : 10.1109/ICDE.2002.994695
On automata, MDDs and BDDs in constraint satisfaction, Proc. of ECAI, 2008. ,
The Art of Computer Programming Fascicle 1: Bitwise Tricks & Techniques; Binary Decision Diagrams, 2009. ,
Efficient BDD Encodings for Partial Order Constraints with Application to Expert Systems in Software Verification, Innovations in Applied Artificial Intelligence, 2004. ,
DOI : 10.1007/978-3-540-24677-0_85
Algorithms and Data Structures in VLSI Design, 1998. ,
DOI : 10.1007/978-3-642-58940-9
Protecting respondents identities in microdata release, IEEE Transactions on Knowledge and Data Engineering, vol.13, issue.6, pp.1010-1027, 2001. ,
DOI : 10.1109/69.971193
Data protection in outsourcing scenarios, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755690
Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints, Proc. of IWSEC 2010, 2010. ,
DOI : 10.1007/978-0-387-27696-0_10