-
2
-
-
33646728544
-
Correlation resistant storage
-
Johns Hopkins University Department of Computer Science
-
L. Ballard, M. Green, B. de Medeiros, and F. Monrose. Correlation resistant storage. Technical Report TR-SP-BGMM-050507, Johns Hopkins University Department of Computer Science, 2005.
-
(2005)
Technical Report
, vol.TR-SP-BGMM-050507
-
-
Ballard, L.1
Green, M.2
De Medeiros, B.3
Monrose, F.4
-
3
-
-
34547239322
-
Achieving efficient conjunctive keyword searches over encrypted data
-
Johns Hopkins University Department of Computer Science
-
L. Ballard, S. Kamara, and F. Monrose. Achieving efficient conjunctive keyword searches over encrypted data. Technical Report TR-SP-BKM-050920, Johns Hopkins University Department of Computer Science, 2005.
-
(2005)
Technical Report
, vol.TR-SP-BKM-050920
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
-
4
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
Advances in Cryptology - CRYPTO 2002. Springer-Verlag
-
P. Barreto, H. Kim, B. Lynn, and M. Scott. Efficient algorithms for pairing-based cryptosystems. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 354-369. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 354-369
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
Scott, M.4
-
5
-
-
35048900981
-
On the selection of pairing-friendly groups
-
Selected Areas in Cryptography -SAC '03. Springer-Verlag
-
P. Barreto, B. Lynn, and M. Scott. On the selection of pairing-friendly groups. In Selected Areas in Cryptography -SAC '03, volume 3006 of Lecture Notes in Computer Science, pages 17-25. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3006
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
6
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - CRYPTO 1996. Springer
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In Advances in Cryptology - CRYPTO 1996, volume 1109 of Lecture Notes in Computer Science, pages 1-15. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
8
-
-
84947778144
-
The decision-diffie Hellman problem
-
Third International Symposium on Algorithmic Number Theory (ANTS-III). Springer-Verlag
-
D. Boneh. The Decision-Diffie Hellman Problem. In Third International Symposium on Algorithmic Number Theory (ANTS-III), volume 1423 of Lecture Notes in Computer Science, pages 48-63. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1423
, pp. 48-63
-
-
Boneh, D.1
-
9
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology - CRYPTO 2004. Springer-Verlag
-
D. Boneh, X. Boyen, and H. Sacham. Short group signatures. In Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Sacham, H.3
-
10
-
-
35048901123
-
Public key encryption with keyword search
-
Advances in Cryptology - Eurocrypt 2004. Springer-Verlag
-
D. Boneh, G. di Crescenzo, R. Ostrovsky, and G. Persiano. Public key encryption with keyword search. In Advances in Cryptology - Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science, pages 506-522. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
12
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Third International Conference on Applied Cryptography and Network Security (ACNS 2005). Springer-Verlag
-
Y. Chang and M. Mitzenmacher. Privacy preserving keyword searches on remote encrypted data. In Third International Conference on Applied Cryptography and Network Security (ACNS 2005), volume 3531 of Lecture Notes in Computer Science, pages 442-455. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 442-455
-
-
Chang, Y.1
Mitzenmacher, M.2
-
13
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Workshop on Design Issues in Anonymity and Unobservability
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: a distributed anonymous information storage and retrieval system. In Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of Lecture Notes in Computer Science, pages 46-66, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2009
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
15
-
-
35048902661
-
Time-scoped searching of encrypted audit logs
-
6th International Conference on Information and Communications Security (ICICS 2004). Springer-Verlag
-
D. Davis, F. Monrose, and M. Reiter. Time-scoped searching of encrypted audit logs. In 6th International Conference on Information and Communications Security (ICICS 2004), volume 3269 of Lecture Notes in Computer Science, pages 532-545. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3269
, pp. 532-545
-
-
Davis, D.1
Monrose, F.2
Reiter, M.3
-
17
-
-
33646723217
-
Secure indexes
-
IACR ePrint Cryptography Archive
-
E-J. Goh. Secure indexes. Technical Report 2003/216, IACR ePrint Cryptography Archive, 2003. See http://eprint.iacr.org/2003/216.
-
(2003)
Technical Report
, vol.2003
, Issue.216
-
-
Goh, E.-J.1
-
18
-
-
33745120364
-
Secure conjunctive keyword search over encrypted data
-
Applied Cryptography and Network Security Conference (ACNS). Springer
-
P. Golle, J. Staddon, and B. Waters. Secure conjunctive keyword search over encrypted data. In Applied Cryptography and Network Security Conference (ACNS), volume 3089 of Lecture Notes in Computer Science, pages 31-45. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3089
, pp. 31-45
-
-
Golle, P.1
Staddon, J.2
Waters, B.3
-
19
-
-
0001685668
-
Real life information retrieval: A study of user queries on the web
-
B. Jansen, A. Spink, J. Bateman, and T. Saracevic. Real life information retrieval: a study of user queries on the web. SIGIR Forum, 32(1):5-17, 1998.
-
(1998)
SIGIR Forum
, vol.32
, Issue.1
, pp. 5-17
-
-
Jansen, B.1
Spink, A.2
Bateman, J.3
Saracevic, T.4
-
20
-
-
0003657590
-
-
Addison-Wesley, Reading, Mass., 2nd edition
-
D. Knuth. The Art of Computer Programming, volume 2. Addison-Wesley, Reading, Mass., 2nd edition, 1981.
-
(1981)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.1
-
21
-
-
0034440650
-
Oceanstore: An architecture for global-scale persistent storage
-
ACM Press
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, C. Wells, and B. Zhao. Oceanstore: an architecture for global-scale persistent storage. In Ninth international conference on Architectural support for programming languages and operating systems, pages 190-201. ACM Press, 2000.
-
(2000)
Ninth International Conference on Architectural Support for Programming Languages and Operating Systems
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Wells, C.10
Zhao, B.11
-
22
-
-
84957812088
-
Selecting cryptographic key sizes
-
3rd International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000). Springer-Verlag
-
A. Lenstra and E. Verheul. Selecting cryptographic key sizes. In 3rd International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000), volume 1751 of Lecture Notes in Computer Science, pages 446-465. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 446-465
-
-
Lenstra, A.1
Verheul, E.2
-
23
-
-
33646740542
-
-
The OpenSSL Library. See http://www.openssl.org.
-
-
-
-
25
-
-
23944469009
-
Public key encryption with conjunctive field keyword search
-
5th International Workshop on Information Security Applications (WISA 2004). Springer-Verlag
-
D. Park, K. Kim, and P. Lee. Public key encryption with conjunctive field keyword search. In 5th International Workshop on Information Security Applications (WISA 2004), volume 3325 of Lecture Notes in Computer Science, pages 73-86. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3325
, pp. 73-86
-
-
Park, D.1
Kim, K.2
Lee, P.3
-
26
-
-
33646718113
-
Authenticated ID-based key exchange and remote log-in with simple to ken and PIN number
-
International Association for Cryptological Research
-
M. Scott. Authenticated ID-based key exchange and remote log-in with simple to ken and PIN number. Technical Report 2002/164, International Association for Cryptological Research, 2002. Available at http://eprint.iacr. org/2002/164.
-
(2002)
Technical Report
, vol.2002
, Issue.164
-
-
Scott, M.1
-
27
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
|