US2016132692A1
|
|
Searchable encryption for infrequent queries in adjustable encrypted databases
|
US2015149427A1
|
|
Encrypted in-memory column-store
|
US9037860B1
|
|
Average-complexity ideal-security order-preserving encryption
|
US2015039586A1
|
|
Local versus remote optimization in encrypted query processing
|
US2014372769A1
|
|
Automatic Protocol Selection in Mixed-Protocol Secure Computation
|
US2014143764A1
|
|
Type-system for mixed protocol secure computation
|
US2014130173A1
|
|
Expression rewriting for secure computation optimization
|
US2013246802A1
|
|
Collusion-resistant outsourcing of private set intersection
|
US2013010950A1
|
|
Public-key encrypted bloom filters with applications to private set intersection
|
US2013013922A1
|
|
Secure dissemination of events in a publish/subscribe network
|
US2012121080A1
|
|
Commutative order-preserving encryption
|
US2011271107A1
|
|
System and method for comparing private data
|
US2010114964A1
|
|
Searchable encryption for outsourcing data analytics
|
US2010329464A1
|
|
Systems and methods for implementing supply chain visibility policies
|
US2010106980A1
|
|
Searchable encryption for outsourcing data analytics
|
US2010014657A1
|
|
Privacy preserving social network analysis
|
US2009323928A1
|
|
Item tracing with supply chain secrecy using RFID tags and an identity-based encryption scheme
|
US2008263650A1
|
|
Enhanced cross-site attack prevention
|
US2008046865A1
|
|
Implementations of secure computation protocols
|