-
1
-
-
0001772530
-
Protocols for secure computations
-
A. Yao, "Protocols for secure computations," in Proc. FOCS, 1982.
-
(1982)
Proc. FOCS
-
-
Yao, A.1
-
2
-
-
0242698195
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," in Proc. PODS, 2001.
-
(2001)
Proc. PODS
-
-
Agrawal, D.1
Aggarwal, C.2
-
5
-
-
85012127915
-
Privacy-preserving indexing of documents on the network
-
M. Bawa, R. Bayardo, and R. Agrawal, "Privacy-preserving indexing of documents on the network," in Proc. VLDB, 2003.
-
(2003)
Proc. VLDB
-
-
Bawa, M.1
Bayardo, R.2
Agrawal, R.3
-
6
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
C. Cachin, "Efficient private bidding and auctions with an oblivious third party," in Proc. ACM CCS, 1999.
-
(1999)
Proc. ACM CCS
-
-
Cachin, C.1
-
7
-
-
48349113304
-
-
Cisco VPN Concentrator, http://www.cisco.com/en/US/products/hw/ vpndevc/ps2284/.
-
Cisco VPN Concentrator
-
-
-
8
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. on Information Theory, vol. 22, no. 6, pp. 644-654, November 1976.
-
(1976)
IEEE Trans. on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
10
-
-
0346682717
-
Sun's SKIP Firewall Traversal for Mobile IP
-
RFC 2356
-
G. Montenegro and V. Gupta, "Sun's SKIP Firewall Traversal for Mobile IP," RFC 2356, 1998.
-
(1998)
-
-
Montenegro, G.1
Gupta, V.2
-
11
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Online, Available
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin, "Protecting data privacy in private information retrieval schemes," in STOC '98, 1998, pp. 151-160. [Online]. Available: citeseer.ist.psu.edu/579393.html
-
(1998)
STOC '98
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
12
-
-
48349140748
-
-
GNU Multiple Precision Arithmetic Library
-
GNU Multiple Precision Arithmetic Library, http:llwww.swox.com/gmp/.
-
-
-
-
14
-
-
0035278163
-
Algorithms for packet classification
-
P. Gupta and N. McKeown, "Algorithms for packet classification, " IEEE Network, vol. 15, no. 2, pp. 24-32, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.2
, pp. 24-32
-
-
Gupta, P.1
McKeown, N.2
-
15
-
-
85065578926
-
A privacy-preserving index for range queries
-
B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. VLDB, 2004.
-
(2004)
Proc. VLDB
-
-
Hore, B.1
Mehrotra, S.2
Tsudik, G.3
-
17
-
-
0034449536
-
Implementing a distributed firewall
-
S. Ioannidis, A. Keromytis, S. Bellovin, and J. Smith, "Implementing a distributed firewall," in Proc. ACM CCS, 2000.
-
(2000)
Proc. ACM CCS
-
-
Ioannidis, S.1
Keromytis, A.2
Bellovin, S.3
Smith, J.4
-
18
-
-
33645753514
-
A security scheme for protecting security policies in firewall
-
J. Lee, J. Jeon, and K. Yoo, "A security scheme for protecting security policies in firewall," SIGOPS Operating System Review, vol. 38, no. 2, pp. 69-72, 2004.
-
(2004)
SIGOPS Operating System Review
, vol.38
, Issue.2
, pp. 69-72
-
-
Lee, J.1
Jeon, J.2
Yoo, K.3
-
20
-
-
48349107147
-
-
OpenVPN
-
OpenVPN, http://openvpn.net/.
-
-
-
-
21
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Transactions on Information Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
22
-
-
84882957020
-
Firewall policy advisor for anomaly detection and rule editing
-
E. Shaer and H. Hamed, "Firewall policy advisor for anomaly detection and rule editing," in Proc. Integrated Management (IM), 2003.
-
(2003)
Proc. Integrated Management (IM)
-
-
Shaer, E.1
Hamed, H.2
-
23
-
-
8344229907
-
Discovery of policy anomalies in distributed firewalls
-
E. Shaer and H. Hamed, "Discovery of policy anomalies in distributed firewalls," in Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Shaer, E.1
Hamed, H.2
-
25
-
-
3142744801
-
On Diffie-Hellman key agreement with short exponents
-
P. van Oorschot and M. Wiener, "On Diffie-Hellman key agreement with short exponents," in Proc. Eurocrypt, 1996.
-
(1996)
Proc. Eurocrypt
-
-
van Oorschot, P.1
Wiener, M.2
-
26
-
-
3042617182
-
A quantitative study of firewall configuration errors
-
A. Wool, "A quantitative study of firewall configuration errors," Computer, vol. 37, no. 6, pp. 62-67, 2004.
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 62-67
-
-
Wool, A.1
|