{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:43:23Z","timestamp":1743129803545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914572"},{"type":"electronic","value":"9783319914589"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91458-9_13","type":"book-chapter","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T20:34:15Z","timestamp":1526070855000},"page":"211-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Collusion-Resistant Processing of SQL Range Predicates"],"prefix":"10.1007","author":[{"given":"Manish","family":"Kesarwani","sequence":"first","affiliation":[]},{"given":"Akshar","family":"Kaul","sequence":"additional","affiliation":[]},{"given":"Gagandeep","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Prasad M.","family":"Deshpande","sequence":"additional","affiliation":[]},{"given":"Jayant R.","family":"Haritsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,12]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of ACM SIGMOD Conference (2004)","key":"13_CR1","DOI":"10.1145\/1007568.1007632"},{"unstructured":"Arasu, A., Blanas, S., Eguro, K., Kaushik, R., Kossmann, D., Ramamurthy, R., Venkatesan, R.: Orthogonal security with cipherbase. In: Proceedings of CIDR Conference (2013)","key":"13_CR2"},{"issue":"12","key":"13_CR3","first-page":"1359","volume":"4","author":"S Bajaj","year":"2011","unstructured":"Bajaj, S., Sion, R.: TrustedDB: a trusted hardware based outsourced database engine. PVLDB 4(12), 1359\u20131362 (2011)","journal-title":"PVLDB"},{"key":"13_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/978-3-642-05445-7_19","volume-title":"Selected Areas in Cryptography","author":"M Bellare","year":"2009","unstructured":"Bellare, M., Ristenpart, T., Rogaway, P., Stegers, T.: Format-preserving encryption. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 295\u2013312. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05445-7_19"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"13_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"A Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578\u2013595. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_33"},{"key":"13_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-319-55753-3_35","volume-title":"Database Systems for Advanced Applications","author":"J Chi","year":"2017","unstructured":"Chi, J., Hong, C., Zhang, M., Zhang, Z.: Fast multi-dimensional range queries on encrypted cloud databases. In: Candan, S., Chen, L., Pedersen, T.B., Chang, L., Hua, W. (eds.) DASFAA 2017. LNCS, vol. 10177, pp. 559\u2013575. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-55753-3_35"},{"doi-asserted-by":"crossref","unstructured":"Demertzis, I., Papadopoulos, S., Papapetrou, O., Deligiannakis, A., Garofalakis, M.: Practical private range search revisited. In: Proceedings of ACM SIGMOD Conference (2016)","key":"13_CR8","DOI":"10.1145\/2882903.2882911"},{"doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of ACM SIGMOD Conference (2002)","key":"13_CR9","DOI":"10.1145\/564691.564717"},{"doi-asserted-by":"crossref","unstructured":"Hore, B., Mehrotra, S., Tsudik, G.: A privacy-preserving index for range queries. In: Proceedings of VLDB Conference (2004)","key":"13_CR10","DOI":"10.1016\/B978-012088469-8.50064-4"},{"doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Frequency-hiding order-preserving encryption. In: Proceedings of CCS Conference (2015)","key":"13_CR11","DOI":"10.1145\/2810103.2813629"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/11535706_6","volume-title":"Data and Applications Security XIX","author":"J Li","year":"2005","unstructured":"Li, J., Omiecinski, E.R.: Efficiency and security trade-off in supporting range queries on encrypted databases. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 69\u201383. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11535706_6"},{"issue":"14","key":"13_CR13","first-page":"1953","volume":"7","author":"R Li","year":"2014","unstructured":"Li, R., Liu, A.X., Wang, A.L., Bruhadeshwar, B.: Fast range query processing with strong privacy protection for cloud computing. PVLDB 7(14), 1953\u20131964 (2014)","journal-title":"PVLDB"},{"doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: Proceedings of IEEE Symposium on Security and Privacy (2013)","key":"13_CR14","DOI":"10.1109\/SP.2013.38"},{"issue":"9","key":"13_CR15","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2330667.2330691","volume":"55","author":"RA Popa","year":"2012","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: CryptDB processing queries on an encrypted database. Commun. ACM 55(9), 103\u2013111 (2012)","journal-title":"Commun. ACM"},{"issue":"5","key":"13_CR16","first-page":"289","volume":"6","author":"S Tu","year":"2013","unstructured":"Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. PVLDB 6(5), 289\u2013300 (2013)","journal-title":"PVLDB"},{"doi-asserted-by":"crossref","unstructured":"Wong, W.K., Kao, B., Cheung, D.W., Li, R., Yiu, S.: Secure query processing with data interoperability in a cloud database environment. In: Proceedings of ACM SIGMOD Conference (2014)","key":"13_CR17","DOI":"10.1145\/2588555.2588572"},{"unstructured":"Xu, J., Fan, J., Ammar, M.H., Moon, A.B.: Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. In: Proceedings of ICNP Conference (2002)","key":"13_CR18"},{"unstructured":"https:\/\/aws.amazon.com\/ec2\/pricing\/","key":"13_CR19"},{"unstructured":"http:\/\/dsl.cds.iisc.ac.in\/publications\/report\/TR\/TR-2016-01.pdf","key":"13_CR20"},{"unstructured":"http:\/\/www.tpc.org\/tpcds\/","key":"13_CR21"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91458-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T11:14:09Z","timestamp":1709810049000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91458-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914572","9783319914589"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91458-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}