-
3
-
-
0003669971
-
-
A. Apostolico and Z. Galil, editors; Oxford University Press
-
A. Apostolico and Z. Galil, editors. Pattern Matching Algorithms. Oxford University Press, 1997.
-
(1997)
Pattern Matching Algorithms
-
-
-
5
-
-
84944184545
-
Transaction-based pseudonyms in audit data for privacy respecting intrusion detection
-
J. Biskup and U. Flegel. Transaction-based pseudonyms in audit data for privacy respecting intrusion detection. In Recent Advances in Intrusion Detection, pages 28-48, 2000.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 28-48
-
-
Biskup, J.1
Flegel, U.2
-
10
-
-
84947931331
-
Some recent research aspects of threshold cryptography
-
Springer-Verlag
-
Y. Desmedt. Some recent research aspects of threshold cryptography. In Lecture Notes in Computer Science 1396, pages 158-173, Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science 1396
, pp. 158-173
-
-
Desmedt, Y.1
-
11
-
-
69749111389
-
Protocols for secure remote database access with approximate matching
-
Wenliang Du and Mikhail J. Atallah. Protocols for secure remote database access with approximate matching. In 7th ACM Conference on Computer and Communications Security (ACMCCS 2000), The First Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000.
-
7th ACM Conference on Computer and Communications Security (ACMCCS 2000), The First Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000
-
-
Wenliang, D.1
Atallah, M.J.2
-
13
-
-
84927517111
-
Privacy-preserving statistical analysis
-
Wenliang Du and Mikhail J. Atallah. Privacy-preserving statistical analysis. In Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14 2001.
-
Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14 2001
-
-
Du, W.1
Atallah, M.J.2
-
14
-
-
0242697772
-
Secure multi-party computational geometry
-
Wenliang Du and Mikhail J. Atallah. Secure multi-party computational geometry. In WADS2001: Seventh International Workshop on Algorithms and Data Structures, Providence, Rhode Island, USA, August 8-10 2001.
-
WADS2001: Seventh International Workshop on Algorithms and Data Structures, Providence, Rhode Island, USA, August 8-10 2001
-
-
Du, W.1
Atallah, M.J.2
-
15
-
-
0011000478
-
An introduction to threshold cryptography
-
RSA Laboratories
-
P. Gemmell. An introduction to threshold cryptography. In CryptoBytes, volume 2. RSA Laboratories, 1997.
-
(1997)
CryptoBytes
, vol.2
-
-
Gemmell, P.1
-
16
-
-
0242690422
-
-
Secure multi-party computation (working draft)
-
O. Goldreich, Secure multi-party computation (working draft). Available from http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 1998.
-
(1998)
-
-
Goldreich, O.1
-
26
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan. Private information retrieval. In Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995.
-
Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
27
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th annual IEEE computer society conference on Foundation of Computer Science, Miami Beach, Florida USA, October 20-22 1997.
-
Proceedings of the 38th Annual IEEE Computer Society Conference on Foundation of Computer Science, Miami Beach, Florida USA, October 20-22 1997
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
28
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, Dallas, TX USA, May 24-26 1998.
-
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX USA, May 24-26 1998
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
30
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology: EUROCRYPT '99, Lecture Notes in Computer Science, 1592:402-414, 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT '99, Lecture Notes in Computer Science
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
32
-
-
0032669864
-
Oblivious transfer and polynomial evaluation (extended abstract)
-
Atlanta, GA, USA, May 1-4
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation (extended abstract). In Proceedings of the 31th ACM Symposium on Theory of Computing, pages 245-254, Atlanta, GA, USA, May 1-4 1999.
-
(1999)
Proceedings of the 31th ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
33
-
-
0242606412
-
A comparison of three randomized response models for quantitative data
-
December
-
K. H. Pollock and Y. Bek. A comparison of three randomized response models for quantitative data. Journal of the American Statistical Association, 71(356):994-886, December 1976.
-
(1976)
Journal of the American Statistical Association
, vol.71
, Issue.356
, pp. 994-886
-
-
Pollock, K.H.1
Bek, Y.2
-
34
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report Tech. Memo TR-81, Aiken Computation Laboratory
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical Report Tech. Memo TR-81, Aiken Computation Laboratory, 1981.
-
(1981)
-
-
Rabin, M.1
-
36
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
37
-
-
0013776710
-
Randomized response: A surey technique for eliminating evasive answer bias
-
March
-
S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, March 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
38
-
-
0000760605
-
Randomized response: A surey technique for eliminating evasive answer bias
-
December
-
S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 66(336):884-888, December 1971.
-
(1971)
Journal of the American Statistical Association
, vol.66
, Issue.336
, pp. 884-888
-
-
Warner, S.L.1
-
40
-
-
0011000478
-
An introduction to threshold cryptography
-
RSA Laboratories
-
P. Gemmell. An introduction to threshold cryptography. In CryptoBytes, volume 2. RSA Laboratories, 1997.
-
(1997)
CryptoBytes
, vol.2
-
-
Gemmell, P.1
-
41
-
-
0242690420
-
-
Secure multi-party computation (working draft)
-
O. Goldreich, Secure multi-party computation (working draft). Available from http://www.wisdom.weizmann.ac.il/home/oded/public_html/foc.html, 1998.
-
(1998)
-
-
Goldreich, O.1
-
51
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan. Private information retrieval. In Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995.
-
Proceedings of IEEE Symposium on Foundations of Computer Science, Milwaukee, WI USA, October 23-25 1995
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
52
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th annual IEEE computer society conference on Foundation of Computer Science, Miami Beach, Florida USA, October 20-22 1997.
-
Proceedings of the 38th Annual IEEE Computer Society Conference on Foundation of Computer Science, Miami Beach, Florida USA, October 20-22 1997
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
53
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proceedings of the thirtieth annual ACM symposium on Theory of computing, Dallas, TX USA, May 24-26 1998.
-
Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, Dallas, TX USA, May 24-26 1998
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
55
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology: EUROCRYPT '99, Lecture Notes in Computer Science, 1592:402-414, 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT '99, Lecture Notes in Computer Science
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
57
-
-
0032669864
-
Oblivious transfer and polynomial evaluation (extended abstract)
-
Atlanta, GA, USA, May 1-4
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation (extended abstract). In Proceedings of the 31th ACM Symposium on Theory of Computing, pages 245-254, Atlanta, GA, USA, May 1-4 1999.
-
(1999)
Proceedings of the 31th ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
58
-
-
0242606412
-
A comparison of three randomized response models for quantitative data
-
December
-
K. H. Pollock and Y. Bek. A comparison of three randomized response models for quantitative data. Journal of the American Statistical Association, 71(356):994-886, December 1976.
-
(1976)
Journal of the American Statistical Association
, vol.71
, Issue.356
, pp. 994-886
-
-
Pollock, K.H.1
Bek, Y.2
-
59
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Technical Report Tech. Memo TR-81, Aiken Computation Laboratory
-
M. Rabin. How to exchange secrets by oblivious transfer. Technical Report Tech. Memo TR-81, Aiken Computation Laboratory, 1981.
-
(1981)
-
-
Rabin, M.1
-
61
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
62
-
-
0013776710
-
Randomized response: A surey technique for eliminating evasive answer bias
-
March
-
S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 60(309):63-69, March 1965.
-
(1965)
Journal of the American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
63
-
-
0000760605
-
Randomized response: A surey technique for eliminating evasive answer bias
-
December
-
S. L. Warner. Randomized response: A surey technique for eliminating evasive answer bias. Journal of the American Statistical Association, 66(336):884-888, December 1971.
-
(1971)
Journal of the American Statistical Association
, vol.66
, Issue.336
, pp. 884-888
-
-
Warner, S.L.1
|