Generic Attacks on Secure Outsourced Databases.
Georgios KellarisGeorge KolliosKobbi NissimAdam O'NeillPublished in: CCS (2016)
Keyphrases
- security mechanisms
- secure routing
- stream cipher
- cryptographic protocols
- chosen plaintext
- outsourced databases
- security protocols
- security measures
- countermeasures
- cryptographic algorithms
- remote user authentication scheme
- advanced encryption standard
- security flaws
- third party
- security issues
- database
- security threats
- information leakage
- unauthorized access
- sql injection
- standard model
- user authentication
- security analysis
- watermarking technique
- security requirements
- watermarking algorithm
- security policies
- ad hoc networks
- smart card
- routing protocol
- information systems
- data mining