Hiding Traversal of Tree Structured Data from Untrusted Data Stores. Lin, P. & Candan, K. S. In Chen, H., Miranda, R., Zeng, D. D., Demchak, C. C., Schroeder, J., & Madhusudan, T., editors, Intelligence and Security Informatics, First NSF/NIJ Symposium, ISI 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings, volume 2665, of Lecture Notes in Computer Science, pages 385, 2003. Springer.
Hiding Traversal of Tree Structured Data from Untrusted Data Stores [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/isi/LinC03,
  author    = {Ping Lin and
               K. Sel{\c{c}}uk Candan},
  editor    = {Hsinchun Chen and
               Richard Miranda and
               Daniel Dajun Zeng and
               Chris C. Demchak and
               Jennifer Schroeder and
               Therani Madhusudan},
  title     = {Hiding Traversal of Tree Structured Data from Untrusted Data Stores},
  booktitle = {Intelligence and Security Informatics, First {NSF/NIJ} Symposium,
               {ISI} 2003, Tucson, AZ, USA, June 2-3, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2665},
  pages     = {385},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-44853-5\_35},
  doi       = {10.1007/3-540-44853-5\_35},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/isi/LinC03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0