-
2
-
-
84886023553
-
Generating satisfiable problem instances
-
Menlo Park, CA, July 30- 3 AAAI Press
-
D. Achlioptas, C. Gomes, H. Kautz, and B. Selman. Generating satisfiable problem instances. In Proceedings of AAAI-00 and IAAI-00, pages 256-261, Menlo Park, CA, July 30- 3 2000. AAAI Press.
-
(2000)
Proceedings of AAAI-00 and IAAI-00
, pp. 256-261
-
-
Achlioptas, D.1
Gomes, C.2
Kautz, H.3
Selman, B.4
-
4
-
-
0024914229
-
Security-control methods for statistical databases
-
December
-
N. R. Adam and J. C. Wortman. Security-control methods for statistical databases. ACM Computing Surveys, 21(4):515-556, December 1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
5
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. C. Aggarwal. On the design and quantification of privacy preserving data mining algorithms. In Symposium on Principles of Database Systems, pages 247-255, 2001.
-
(2001)
Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
7
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
J. Cohen Benaloh and M. de Mare. One-way accumulators: A decentralized alternative to digital signatures. In Advances in Cryptology - EUROCRYPT '93, pages 274-285, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT '93
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
9
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
George Robert Blakely and David Chaum, editors, Advances in Cryptology: proceedings of CRYPTO 84, Berlin, Germany / Heidelberg, Germany / London, UK / etc., Springer-Verlag
-
M. Blum and S. Goldwasser. An efficient probabilistic public-key encryption scheme which hides all partial information. In George Robert Blakely and David Chaum, editors, Advances in Cryptology: proceedings of CRYPTO 84, volume 196 of Lecture Notes in Computer Science, pages 289-302, Berlin, Germany / Heidelberg, Germany / London, UK / etc., 1985. Springer-Verlag.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
10
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
Moti Yung, editor, Advances in Cryptology - CRYPTO ' 2002, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Moti Yung, editor, Advances in Cryptology - CRYPTO ' 2002, volume 2442 of Lecture Notes in Computer Science, pages 61-76. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
0022754707
-
Security problems on inference control for sum, max, and min queries
-
F. Chin. Security problems on inference control for sum, max, and min queries. J. ACM, 33(3):451-464, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.3
, pp. 451-464
-
-
Chin, F.1
-
12
-
-
0004356882
-
Finding hard instances of the satisfiability problem: A survey
-
Du, Gu, and Pardalos, editors, Satisfiability Problem: Theory and Applications, American Mathematical Society
-
S. A. Cook and D. G. Mitchell. Finding hard instances of the satisfiability problem: A survey. In Du, Gu, and Pardalos, editors, Satisfiability Problem: Theory and Applications, volume 35 of Dimacs Series in Discrete Mathematics and Theoretical Computer Science, pages 1-17. American Mathematical Society, 1997.
-
(1997)
Dimacs Series in Discrete Mathematics and Theoretical Computer Science
, vol.35
, pp. 1-17
-
-
Cook, S.A.1
Mitchell, D.G.2
-
14
-
-
0020779363
-
Inference controls for statistical databases
-
July
-
D.E. Denning and J. Schlorer. Inference controls for statistical databases. Computer, 16(7):69-82, July 1983.
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.E.1
Schlorer, J.2
-
15
-
-
0018444418
-
Secure databases: Protection against user influence
-
March
-
D. Dobkin, A. Jones, and R. Lipton. Secure databases: Protection against user influence. ACM Transactions on Database Systems, 4(1):97-106, March 1979.
-
(1979)
ACM Transactions on Database Systems
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
18
-
-
33750243562
-
On-line negative databases (with experimental results)
-
F. Esponda, E. S. Ackley, S. Forrest, and P. Helman. On-line negative databases (with experimental results). International Journal of Unconventional Computing, 1(3):201-220, 2005.
-
(2005)
International Journal of Unconventional Computing
, vol.1
, Issue.3
, pp. 201-220
-
-
Esponda, F.1
Ackley, E.S.2
Forrest, S.3
Helman, P.4
-
21
-
-
85009782374
-
Cryptography and np-completeness
-
Springer-Verlag
-
S. Even and Y. Yacobi. Cryptography and np-completeness. In Proc. 7th Colloq. Automata, Languages, and Programming (Lecture Notes in Computer Science), volume 85, pages 195-207. Springer-Verlag, 1980.
-
(1980)
Proc. 7th Colloq. Automata, Languages, and Programming (Lecture Notes in Computer Science)
, vol.85
, pp. 195-207
-
-
Even, S.1
Yacobi, Y.2
-
24
-
-
0042514966
-
How to fake an RSA signature by encoding modular root finding as a SAT problem
-
C. Fiorini, E. Martinelli, and F. Massacci. How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Appl. Math., 130(2):101-127, 2003.
-
(2003)
Discrete Appl. Math.
, vol.130
, Issue.2
, pp. 101-127
-
-
Fiorini, C.1
Martinelli, E.2
Massacci, F.3
-
29
-
-
0024768555
-
Efficient cryptographic schemes provably as secure as subset sum
-
IEEE, editor, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, IEEE Computer Society Press
-
R. Impagliazzo and M. Naor. Efficient cryptographic schemes provably as secure as subset sum. In IEEE, editor, 30th annual Symposium on Foundations of Computer Science, October 30-November 1, 1989, Research Triangle Park, NC, pages 236-241, 1109 Spring Street, Suite 300, Silver Spring, MD 20910, USA, 1989. IEEE Computer Society Press.
-
(1989)
30th Annual Symposium on Foundations of Computer Science, October 30-November 1, 1989, Research Triangle Park, NC
, pp. 236-241
-
-
Impagliazzo, R.1
Naor, M.2
-
30
-
-
33750271288
-
Generating hard satisfiable formulas by hiding solutions deceptively
-
H. Jia, C. Moore, and D. Strain. Generating hard satisfiable formulas by hiding solutions deceptively. In AAAI, 2005.
-
(2005)
AAAI
-
-
Jia, H.1
Moore, C.2
Strain, D.3
-
31
-
-
84880900032
-
Balance and filtering in structured satisfiable problems
-
H. A. Kautz, Y. Ruan, D. Achlioptas, C. Gomes, B. Selman, and M. E. Stickel. Balance and filtering in structured satisfiable problems. In IJCAI, pages 351-358, 2001.
-
(2001)
IJCAI
, pp. 351-358
-
-
Kautz, H.A.1
Ruan, Y.2
Achlioptas, D.3
Gomes, C.4
Selman, B.5
Stickel, M.E.6
-
32
-
-
33750232780
-
Inference control via query restriction vs. data modification: A perspective
-
North-Holland Publishing Co.
-
N. S. Matloff. Inference control via query restriction vs. data modification: a perspective. In on Database Security: Status and Prospects, pages 159-166. North-Holland Publishing Co., 1988.
-
(1988)
On Database Security: Status and Prospects
, pp. 159-166
-
-
Matloff, N.S.1
-
35
-
-
0027002161
-
Problem solving: Hardness and easiness - Hard and easy distributions of SAT problems
-
AAAI Press, Menlo Park, California, USA
-
D. Mitchell, B. Selman, and H. Levesque. Problem solving: Hardness and easiness - hard and easy distributions of SAT problems. In Proceeding of (AAAI-92), pages 459-465. AAAI Press, Menlo Park, California, USA, 1992.
-
(1992)
Proceeding of (AAAI-92)
, pp. 459-465
-
-
Mitchell, D.1
Selman, B.2
Levesque, H.3
-
36
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
New York, NY 10036, USA, ACM Press
-
M. Naor and M. Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing: Seattle, Washington, May 15-17, 1989, pages 33-43, New York, NY 10036, USA, 1989. ACM Press.
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing: Seattle, Washington, May 15-17, 1989
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
37
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
Carl Pomerance and S. Goldwasser, editors, Cryptology and Computational Number Theory, pub-AMS
-
A. M. Odlyzko. The rise and fall of knapsack cryptosystems. In Carl Pomerance and S. Goldwasser, editors, Cryptology and Computational Number Theory, volume 42 of Proceedings of symposia in applied mathematics. AMS short course lecture notes, pages 75-88. pub-AMS, 1990.
-
(1990)
Proceedings of Symposia in Applied Mathematics. AMS Short Course Lecture Notes
, vol.42
, pp. 75-88
-
-
Odlyzko, A.M.1
-
38
-
-
35048885162
-
Efficient consistency proofs for generalized queries on a committed database
-
R. Ostrovsky, C. Rackoff, and A. Smith. Efficient consistency proofs for generalized queries on a committed database. In ICALP: Annual International Colloquium on Automata, Languages and Programming, pages 1041-1053, 2004.
-
(2004)
ICALP: Annual International Colloquium on Automata, Languages and Programming
, pp. 1041-1053
-
-
Ostrovsky, R.1
Rackoff, C.2
Smith, A.3
-
40
-
-
0028393221
-
A modified random perturbation method for database security
-
P. Tendick and N. Matloff. A modified random perturbation method for database security. ACM Trans. Database Syst., 19(1):47-63, 1994.
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
|