-
1
-
-
33744908786
-
Privacy-enhanced searches using encrypted bloom filters
-
Feb
-
S. Bellovin and W. Cheswick. Privacy-enhanced searches using encrypted bloom filters. Cryptology ePrint Archive, Report 2004/022, Feb 2004.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.22
-
-
Bellovin, S.1
Cheswick, W.2
-
2
-
-
35048901123
-
Public-key encryption with keyword search
-
C. Cachin, editor, LNCS. Springer-Verlag, May
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-key encryption with keyword search. In C. Cachin, editor, Proceedings of Eurocrypt 2004, LNCS. Springer-Verlag, May 2004.
-
(2004)
Proceedings of Eurocrypt 2004
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, Jul 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
6
-
-
0032201622
-
Private information retrieval
-
Nov
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. Journal of the ACM, 45(6):965-981, Nov 1998.
-
(1998)
Journal of the ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
34748812366
-
Privacy preserving keyword searches on remote encrypted data
-
Feb
-
Y.-C. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. Cryptology ePrint Archive, Report 2004/051, Feb 2004.
-
(2004)
Cryptology EPrint Archive, Report
, vol.2004
, Issue.51
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
9
-
-
33244488406
-
-
An early version of this paper first appeared on the Cryptology ePrint Archive on October 7th 2003. May 5
-
Eu-Jin Goh. Secure Indexes. An early version of this paper first appeared on the Cryptology ePrint Archive on October 7th 2003. May 5, 2004
-
(2004)
Secure Indexes
-
-
Goh, E.-J.1
-
13
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Internet Society (ISOC), Feb
-
B.Waters, D. Balfanz, G. Durfee, and D. Smetters. Building an encrypted and searchable audit log. In Proceedings of the 11th Network and Distributed System Security (NDSS) Symposium, pages 205-214. Internet Society (ISOC), Feb 2004.
-
(2004)
Proceedings of the 11th Network and Distributed System Security (NDSS) Symposium
, pp. 205-214
-
-
Waters, B.1
Balfanz, D.2
Durfee, G.3
Smetters, D.4
-
14
-
-
84982836904
-
Efficient security mechanisms for routing protocols
-
February
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient security mechanisms for routing protocols. In Network and Distributed System Security Symposium, NDSS03, pages 57-73, February 2003.
-
(2003)
Network and Distributed System Security Symposium, NDSS03
, pp. 57-73
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and J.D. Tygar. ELK, a new protocol for efficient large-group key distribution. In Proceedings of IEEE Symposium on Security and Privacy, pages 247-262, 2001.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
16
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
ASIACRYPT2000
-
M.Jakobsson and A. Juels. Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT2000, LNCS 1976, pages 162-177, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 162-177
-
-
Jakobsson, M.1
Juels, A.2
|