Separating Authentication from Query Execution in Outsourced Databases | IEEE Conference Publication | IEEE Xplore