-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
[AIR01]. Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001 Innsbruck, Austria, 6-10 May. Springer-Verlag
-
[AIR01] William Aiello, Yuval Ishai, and Omer Reingold. Priced Oblivious Transfer: How to Sell Digital Goods. In Birgit Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, pages 119-135, Innsbruck, Austria, 6-10 May 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
0001371923
-
Fast discovery of association rules
-
+96]. Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy Uthurusamy, editors. AAAI/MIT Press
-
+96] Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, and A. Inkeri Verkamo. Fast Discovery of Association Rules. In Usama M. Fayyad, Gregory Piatetsky-Shapiro, Padhraic Smyth, and Ramasamy Uthurusamy, editors, Advances in Knowledge Discovery and Data Mining, pages 307-328. AAAI/MIT Press, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
, pp. 307-328
-
-
Agrawal, R.1
Mannila, H.2
Srikant, R.3
Toivonen, H.4
Verkamo, A.I.5
-
3
-
-
84942749652
-
Frequent closures as a concise representation for binary data mining
-
[BB00]. PAKDD 2000. Springer
-
[BB00] Jean-Fran?is Boulicaut and Artur Bykowski. Frequent Closures as a Concise Representation for Binary Data Mining. In PAKDD 2000, volume 1805 of Lecture Notes in Computer Science, pages 62-73. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1805
, pp. 62-73
-
-
Boulicaut, J.-F.1
Bykowski, A.2
-
4
-
-
0037243046
-
Free-sets: A condensed representation of boolean data for the approximation of frequency queries
-
[BBR03]
-
[BBR03] Jean-Fran?is Boulicaut, Artur Bykowski, and Christophe Rigotti. Free-Sets: A Condensed Representation of Boolean Data for the Approximation of Frequency Queries. Data Mining and Knowledge Discovery, 7(1):5-22, 2003.
-
(2003)
Data Mining and Knowledge Discovery
, vol.7
, Issue.1
, pp. 5-22
-
-
Boulicaut, J.-F.1
Bykowski, A.2
Rigotti, C.3
-
5
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
[CGS97]. Walter Fumy, editor, Advances in Cryptology - EUROCRYPT'97, Konstanz, Germany, 11-15 May. Springer-Verlag
-
[CGS97] Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT'97, volume 1233 of Lecture Notes in Computer Science, pages 103-118, Konstanz, Germany, 11-15 May 1997. Springer-Verlag.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
6
-
-
84927517111
-
Privacy-preserving statistical analysis
-
[DA01a], New Orleans, Louisiana, USA, December 10-14
-
[DA01a] Wenliang Du and Mikhail J. Atallah. Privacy-Preserving Statistical Analysis. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 102-110, New Orleans, Louisiana, USA, December 10-14 2001.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
7
-
-
70449677016
-
Protocols for secure remote database access with approximate matching
-
[DA01b]. Kluwer Academic Publishers, Boston
-
[DA01b] Wenliang Du and Mikhail J. Atallah. Protocols for Secure Remote Database Access with Approximate Matching, volume 2 of Advances in Information Security, page 192. Kluwer Academic Publishers, Boston, 2001. http://www.wkap.nl/prod/b/0-7923-7399-5.
-
(2001)
Advances in Information Security
, vol.2
, pp. 192
-
-
Du, W.1
Atallah, M.J.2
-
8
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
[DJ01]. Kwangjo Kim, editor, Public Key Cryptography 2001, Cheju Island, Korea, 13-15 February. Springer-Verlag
-
[DJ01] Ivan Damgård and Mads Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Kwangjo Kim, editor, Public Key Cryptography 2001, volume 1992 of Lecture Notes in Computer Science, pages 119-136, Cheju Island, Korea, 13-15 February 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
[DZ02]. Carla Marceau and Simon Foley, editors, Virginia Beach, virginia, USA, September 23-26. ACM Press
-
[DZ02] Wenliang Du and Zhijun Zhan. A Practical Approach to Solve Secure Multi-party Computation Problems. In Carla Marceau and Simon Foley, editors, Proceedings of New Security Paradigms Workshop, pages 127-135, Virginia Beach, virginia, USA, September 23-26 2002. ACM Press.
-
(2002)
Proceedings of New Security Paradigms Workshop
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
10
-
-
35048820609
-
Efficient private matching and set intersection
-
[FNP04]. Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, Interlaken, Switzerland, 2-6 May. Springer-Verlag
-
[FNP04] Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. Efficient Private Matching and Set Intersection. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 1-19, Interlaken, Switzerland, 2-6 May 2004. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
12
-
-
84957026937
-
Secure vickrey auctions without threshold trust
-
[LAN02]. Matt Blaze, editor, Financial Cryptography -Sixth International Conference, Southhampton Beach, Bermuda, 11-14 March. Springer-Verlag
-
[LAN02] Helger Lipmaa, N. Asokan, and Valtteri Niemi. Secure Vickrey Auctions without Threshold Trust. In Matt Blaze, editor, Financial Cryptography -Sixth International Conference, volume 2357 of Lecture Notes in Computer Science, pages 87-101, Southhampton Beach, Bermuda, 11-14 March 2002. Springer-Verlag.
-
(2002)
Lecture Notes in Computer Science
, vol.2357
, pp. 87-101
-
-
Lipmaa, H.1
Asokan, N.2
Niemi, V.3
-
13
-
-
0345058958
-
On diophantine complexity and statistical zero-knowledge arguments
-
[Lip03]. Chi Sung Laih, editor, Advances on Cryptology - ASIACRYPT 2003, Taipei, Taiwan, 30 November-4 December. Springer-Verlag
-
[Lip03] Helger Lipmaa. On Diophantine Complexity and Statistical Zero-Knowledge Arguments. In Chi Sung Laih, editor, Advances on Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 398-415, Taipei, Taiwan, 30 November-4 December 2003. Springer-Verlag.
-
(2003)
Lecture Notes in Computer Science
, vol.2894
, pp. 398-415
-
-
Lipmaa, H.1
-
14
-
-
24944497925
-
An oblivious transfer protocol with log-squared total communication
-
[Lip04]. International Association for Cryptologic Research, February 25
-
[Lip04] Helger Lipmaa. An Oblivious Transfer Protocol with Log-Squared Total Communication. Technical Report 2004/063, International Association for Cryptologic Research, February 25 2004.
-
(2004)
Technical Report
, vol.2004
, Issue.63
-
-
Lipmaa, H.1
-
15
-
-
24944434888
-
On private similarity search protocols
-
[LL04]. Sanna Liimatainen and Teemupekka Virtanen, editors, Espoo, Finland, November 4-5
-
[LL04] Sven Laur and Helger Lipmaa. On Private Similarity Search Protocols. In Sanna Liimatainen and Teemupekka Virtanen, editors, Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004), pages 73-77, Espoo, Finland, November 4-5, 2004.
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems (NordSec 2004)
, pp. 73-77
-
-
Laur, S.1
Lipmaa, H.2
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
[Pai99]. Jacques Stern, editor, Advances in Cryptology -EUROCRYPT'99, Prague, Czech Republic, 2-6 May. Springer-Verlag
-
[Pai99] Pascal Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Jacques Stern, editor, Advances in Cryptology -EUROCRYPT'99, volume 1592 of Lecture Notes in Computer Science, pages 223-238, Prague, Czech Republic, 2-6 May 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
[Pin02]
-
[Pin02] Benny Pinkas. Cryptographic Techniques for Privacy-Preserving Data Mining. KDD Explorations, 4(2):12-19, 2002.
-
(2002)
KDD Explorations
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
20
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
[VC02], Edmonton, Alberta, Canada, July 23-26. ACM
-
[VC02] Jaideep Vaidya and Chris Clifton. Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In Proceedings of The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 639-644, Edmonton, Alberta, Canada, July 23-26 2002. ACM.
-
(2002)
Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
22
-
-
12244255356
-
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
-
[WY04], Seattle, Washington, USA, August 22-25. ACM
-
[WY04] Rebecca N. Wright and Zhiqiang Yang. Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data. In Proceedings of The Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 713-718, Seattle, Washington, USA, August 22-25 2004. ACM.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 713-718
-
-
Wright, R.N.1
Yang, Z.2
|