-
1
-
-
34548353664
-
-
Google click fraud, http://www.law.com/jsp/article.jsp?id=1153213525657.
-
Google click fraud
-
-
-
2
-
-
34548332202
-
-
Msnbc dataset, http://kdd.ics.uci.edu/databases/msnbc/msnbc.html.
-
Msnbc dataset
-
-
-
4
-
-
0033294694
-
On the security of pay-per-click and other Web advertising schemes
-
V. Anupam, A. Mayer, K. Nissim, B. Pinkas, and M. K. Reiter. On the security of pay-per-click and other Web advertising schemes. Computer Networks (Amsterdam, Netherlands: 1999).
-
Computer Networks (Amsterdam, Netherlands: 1999)
-
-
Anupam, V.1
Mayer, A.2
Nissim, K.3
Pinkas, B.4
Reiter, M.K.5
-
5
-
-
0000416796
-
Optimistic fair exchange of digital signatures
-
N. Asokan and V. Shoup. Optimistic fair exchange of digital signatures. EUROCRYPT '98, 1998.
-
(1998)
EUROCRYPT '98
-
-
Asokan, N.1
Shoup, V.2
-
6
-
-
35248872489
-
-
M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, and M. Waidner. iKP - A family of secure electronic payment protocols, pages 89-106.
-
iKP - A family of secure electronic payment protocols
, pp. 89-106
-
-
Bellare, M.1
Garay, J.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
9
-
-
24944435537
-
Compact e-cash
-
EUROCRYPT'05, of
-
J. Camenisch, S. Hohenberger, and A. Lysyanskaya. Compact e-cash. EUROCRYPT'05, volume 3494 of LNCS, pp. 302-321.
-
LNCS
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
10
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. Crypto 2003.
-
Crypto 2003
-
-
Camenisch, J.1
Shoup, V.2
-
11
-
-
0002391080
-
Untraceable electronic cash)
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash). CRYPTO '88, pp. 319-327., 1989.
-
(1989)
CRYPTO '88
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
12
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. LNCS, 1462, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Cramer, R.1
Shoup, V.2
-
13
-
-
34250668863
-
Approximately detecting duplicates for streaming data using stable bloom filters
-
F. Deng and D. Rafiei. Approximately detecting duplicates for streaming data using stable bloom filters. In ACM SIGMOD'06.
-
ACM SIGMOD'06
-
-
Deng, F.1
Rafiei, D.2
-
14
-
-
0000097412
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Crypto '86.
-
Crypto '86
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
84944906479
-
Secure and efficient off-line digital money
-
London, UK. Springer-Verlag
-
M. K. Franklin and M. Yung. Secure and efficient off-line digital money. In ICALP '93, pages 265-276, London, UK. Springer-Verlag.
-
ICALP '93
, pp. 265-276
-
-
Franklin, M.K.1
Yung, M.2
-
17
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
19
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 13, 2000.
-
(2000)
Journal of Cryptology
, vol.13
-
-
Pointcheval, D.1
Stern, J.2
-
20
-
-
0002360237
-
Non-interactive zero-knowledge proofs of knowledge and chosen-ciphertext attack
-
C. Rackoff and D. Simon. Non-interactive zero-knowledge proofs of knowledge and chosen-ciphertext attack. LNCS, CRYPTO 91.
-
LNCS, CRYPTO 91
-
-
Rackoff, C.1
Simon, D.2
-
22
-
-
34548360945
-
Cryptography: Theory and practice
-
D. R. Stinson. Cryptography: theory and practice. CRC Press, 1995.
-
(1995)
CRC Press
-
-
Stinson, D.R.1
-
23
-
-
34548371522
-
Pricing in publish/subscribe systems
-
A. Tanner and M. A. Jaeger. Pricing in publish/subscribe systems. In ICEC '04.
-
ICEC '04
-
-
Tanner, A.1
Jaeger, M.A.2
-
24
-
-
84929315070
-
Security issues and requirements for internet-scale publish-subscribe systems
-
C. Wang, A. Carzaniga, D. Evans, and A. Wolf. Security issues and requirements for internet-scale publish-subscribe systems. In HICSS'02.
-
HICSS'02
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.4
|