-
2
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2):157-169, 2003.
-
(2003)
The VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
3
-
-
35048857810
-
Cryptographic randomized response techniques
-
Public Key Cryptography, PKC 2004, of
-
Andris Ambainis, Markus Jakobsson, and Helger Lipmaa. Cryptographic randomized response techniques. In Public Key Cryptography - PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 425-438, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2947
, pp. 425-438
-
-
Ambainis, A.1
Jakobsson, M.2
Lipmaa, H.3
-
4
-
-
34547376466
-
Theft-protected proprietary certificates
-
Digital Rights Management Workshop, DRM 2002, of
-
Alexandra Boldyreva and Markus Jakobsson. Theft-protected proprietary certificates. In Digital Rights Management Workshop - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages 208-220, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2696
, pp. 208-220
-
-
Boldyreva, A.1
Jakobsson, M.2
-
5
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0034188648
-
Tracing traitors
-
Benny Chor, Amos Fiat, Moni Naor, and Benny Pinkas. Tracing traitors. IEEE Transactions on Information Theory, 46(3):893-910, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
85001025766
-
Wallet databases with observers
-
Advances in Cryptology-CRYPTO '92, of
-
David Chaum and Torben P. Pedersen. Wallet databases with observers. In Advances in Cryptology-CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
9
-
-
24644493543
-
Proof systems for general statements about discrete logarithms
-
Technical Report 260, Dept. of Computer Science, ETH Zurich, March
-
Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report 260, Dept. of Computer Science, ETH Zurich, March 1997.
-
(1997)
-
-
Camenisch, J.1
Stadler, M.2
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
TCC 2006, of
-
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 265-284, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
33746335051
-
Differential privacy. Invited talk
-
ICALP 2006, of
-
Cynthia Dwork. Differential privacy. Invited talk. In ICALP 2006, Part II, volume 4052 of Lecture Notes in Computer Science, pages 1-12, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, Issue.PART II
, pp. 1-12
-
-
Dwork, C.1
-
14
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Public Key Cryptography, PKC 2008, of
-
Jens Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography - PKC 2008, volume 2567 of Lecture Notes in Computer Science, pages 145-160, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
15
-
-
34547355866
-
Proprietary certificates
-
Topics in Cryptology, CT-RSA 2002, of
-
Markus Jakobsson, Ari Juels, and Phong Q. Nguyen. Proprietary certificates. In Topics in Cryptology - CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, pages 164-181. 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 164-181
-
-
Jakobsson, M.1
Juels, A.2
Nguyen, P.Q.3
-
19
-
-
0002986502
-
Fault tolerant anonymous channel
-
ICICS '97, of
-
Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, and Kazunori Takatani. Fault tolerant anonymous channel. In ICICS '97, volume 1334 of Lecture Notes in Computer Science, pages 440-444, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
20
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
John M. Pollard. Monte Carlo methods for index computation (mod p). Mathematics of Computation, 32:918-924, 1978.
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
21
-
-
84947921515
-
Asymmetric fingerprinting (extended abstract)
-
Advances in Cryptology, EUROCRYPT '96, of
-
Birgit Pfitzmann and Matthias Schunter. Asymmetric fingerprinting (extended abstract). In Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 84-95, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
22
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus-Peter Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
23
-
-
0013776710
-
Randomized response: A survey technique for eliminating evasive answer bias
-
March
-
Stanley L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. The American Statistical Association, 60(309):63-69, March 1965.
-
(1965)
The American Statistical Association
, vol.60
, Issue.309
, pp. 63-69
-
-
Warner, S.L.1
-
24
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
Chicago, Illinois, 3-5 November, IEEE
-
Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 160-164, Chicago, Illinois, 3-5 November 1982. IEEE.
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Chi-Chih Yao, A.1
|