-
4
-
-
0642373214
-
Kangaroo - A pattern-matching program for biological sequences
-
D. Betel, and C. Hogue. Kangaroo - A pattern-matching program for biological sequences. Bioinformatics 3(20), 2002.
-
(2002)
Bioinformatics
, vol.3
, Issue.20
-
-
Betel, D.1
Hogue, C.2
-
5
-
-
20444460385
-
Private Collaborative Forecasting and Benchmarking
-
M. Bykova, M. Atallah, J. Li, K. Frikken, and M. Topkara. Private Collaborative Forecasting and Benchmarking. Proceedings of the 3rd Workshop on Privacy in the Electronic Society, 2004.
-
(2004)
Proceedings of the 3rd Workshop on Privacy in the Electronic Society
-
-
Bykova, M.1
Atallah, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
6
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Proceedings of EUROCRYPT, 1999.
-
(1999)
Proceedings of EUROCRYPT
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
7
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
-
-
Canetti, R.1
-
10
-
-
0008538346
-
A further weakness in the common modulus protocol for the RSA cryptoalgorithm
-
J. DeLaurentis. A further weakness in the common modulus protocol for the RSA cryptoalgorithm. Ciyptologia 8(3), 1984.
-
(1984)
Ciyptologia
, vol.8
, Issue.3
-
-
DeLaurentis, J.1
-
12
-
-
0034903818
-
Extending traditional query-based integration approaches for functional characterization of post-genomic data
-
B. Eckman, A. Kosky, L. Laroco. Extending traditional query-based integration approaches for functional characterization of post-genomic data. Bioinformatics 17(7), 2001.
-
(2001)
Bioinformatics
, vol.17
, Issue.7
-
-
Eckman, B.1
Kosky, A.2
Laroco, L.3
-
16
-
-
0003839182
-
Secure Multi-party Computation
-
Available at
-
O. Goldreich. Secure Multi-party Computation. Available at http://www.wisdom.weizmann.ac.il/oded/pp.html, 2002.
-
(2002)
-
-
Goldreich, O.1
-
18
-
-
0003620778
-
-
Addison Wesley
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to Automata Theory, Languages, and Computation. Addison Wesley, 2000.
-
(2000)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
19
-
-
33845526132
-
Practical Private Regular Expression Matching
-
Technical Report, University of Dortmund, available at
-
F. Kerschbaum. Practical Private Regular Expression Matching. Technical Report, University of Dortmund, available at http://www4.cs.uni-dortmund.de/RVS/FX/, 2005.
-
(2005)
-
-
Kerschbaum, F.1
-
21
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig, and M. Hellman. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory 24, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
-
-
Pohlig, S.1
Hellman, M.2
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|