-
4
-
-
0036082701
-
Collaborative filtering with privacy
-
J. Canny. Collaborative Filtering with Privacy. In IEEE Security and Privacy, 2002.
-
(2002)
IEEE Security and Privacy
-
-
Canny, J.1
-
5
-
-
0019532104
-
Untraceable electronic mail, return addesses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addesses, and digital pseudonyms. Communications of the ACM, 24(2), pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
33745785112
-
Towards a privacy measurement criterion for voting systems
-
Poster Paper, May
-
L. Coney, J. L. Hall, P. L. Vora, D. Wagner. Towards a Privacy Measurement Criterion for Voting Systems. Poster Paper, National Conference on Digital Government Research, May 2005.
-
(2005)
National Conference on Digital Government Research
-
-
Coney, L.1
Hall, J.L.2
Vora, P.L.3
Wagner, D.4
-
9
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
LNCS
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology - Eurocrypt '97, LNCS 1233, pp. 103-118, 1997.
-
(1997)
Advances in Cryptology - Eurocrypt '97
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
10
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
LNCS
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - Crypto '94, LNCS 839, pp. 174-187, 1994.
-
(1994)
Advances in Cryptology - Crypto '94
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
11
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
LNCS
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology - Crypto '86, LNCS 283, pp. 186-194, 1987.
-
(1987)
Advances in Cryptology - Crypto '86
, vol.283
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
36048992623
-
Introducing tarzan, a peer-to-peer anonymizing network layer
-
M. J. Freedman, E. Sit, J. Gates, and R. Morris. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Freedman, M.J.1
Sit, E.2
Gates, J.3
Morris, R.4
-
14
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Feb
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion Routing for Anonymous and Private Internet Connections. In CACM, Feb 1999.
-
(1999)
CACM
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
15
-
-
33745775934
-
Privacy-preserving friends troubleshooting network
-
San Diego, CA.
-
Q. Huang, H. J. Wang, and N. Borisov. Privacy-Preserving Friends Troubleshooting Network. ISOC NDSS 2005, San Diego, CA.
-
ISOC NDSS 2005
-
-
Huang, Q.1
Wang, H.J.2
Borisov, N.3
-
17
-
-
84945135059
-
Cryptographic counters and applications to electronic voting
-
LNCS
-
J. Katz, S. Myers, and R. Ostrovsky. Cryptographic Counters and Applications to Electronic Voting. In Advances in Cryptology -Eurocrypt 2001, LNCS 2045, pp. 78-92, 2001.
-
(2001)
Advances in Cryptology -Eurocrypt 2001
, vol.2045
, pp. 78-92
-
-
Katz, J.1
Myers, S.2
Ostrovsky, R.3
-
19
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Math. Comp. 48 (1987), pp. 203-209.
-
(1987)
Math. Comp.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
20
-
-
0000653210
-
Selecting cryptographic key sizes
-
A. Lenstra and E. Verheul. Selecting Cryptographic Key Sizes. J. Cryptology 14 (2001), no. 4, pp. 255-293.
-
(2001)
J. Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.1
Verheul, E.2
-
21
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
LNCS
-
T. Pedersen. A threshold cryptosystem without a trusted party. In Advances in Cryptology - Eurocrypt '91, LNCS 547, pp. 522-526, 1991.
-
(1991)
Advances in Cryptology - Eurocrypt '91
, vol.547
, pp. 522-526
-
-
Pedersen, T.1
-
24
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Comm. ACM 22 (1979), no. 11, pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
25
-
-
84856043672
-
A mathematical theory of communication
-
C. E. Shannon. A Mathematical Theory Of Communication. Bell System Tech. J. 27 (1948), pp. 379-423, 623-656.
-
(1948)
Bell System Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
27
-
-
34748911065
-
Friends troubleshooting network: Towards privacy-preserving, automatic troubleshooting
-
H. J. Wang, Y. C. Hu, C. Yuan, Z. Zhang, and Y. M. Wang. Friends Troubleshooting Network: Towards Privacy-Preserving, Automatic Troubleshooting. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004.
-
(2004)
Proceedings of the 3rd International Workshop on Peer-to-peer Systems (IPTPS)
-
-
Wang, H.J.1
Hu, Y.C.2
Yuan, C.3
Zhang, Z.4
Wang, Y.M.5
|