Pushing the Limits of Encrypted Databases with Secure Hardware.
Panagiotis AntonopoulosArvind ArasuKen EguroJoachim HammerRaghav KaushikDonald KossmannRavi RamamurthyJakub SzymaszekPublished in: CoRR (2018)
Keyphrases
- databases
- encryption key
- low cost
- database
- database systems
- knowledge discovery
- real time
- hardware and software
- relational databases
- encryption scheme
- embedded systems
- data integration
- image processing
- data model
- hardware implementation
- information systems
- data encryption
- vlsi implementation
- encryption algorithm
- key distribution
- standard model
- security analysis
- processing units
- security requirements
- computer systems
- data management