-
1
-
-
4243443776
-
-
Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33, Oct, Online, Available
-
U. Manber, "Finding similar files in a large file system," Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33, Oct. 1993. [Online]. Available: ftp://ftp.cs.arizona.edu/ reports/1993/TR93-33.pdf
-
(1993)
Finding similar files in a large file system
-
-
Manber, U.1
-
2
-
-
1142267351
-
Winnowing: Local algorithms for document fingerprinting
-
San Diego, California, United States: ACM, June 9-12
-
S. Schleimer, D. S. Wilkerson, and A. Aiken, "Winnowing: Local algorithms for document fingerprinting," in Proceedings of the ACM SIGMOD Conference on Management of Data. San Diego, California, United States: ACM, June 9-12 2003, pp. 76-85.
-
(2003)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
3
-
-
79959990623
-
Plagiarism detection in arXiv
-
Hong Kong, China, Dec. 18-12
-
D. Sorokina, J. Gehrke, S. Warner, and P. Ginsparg, "Plagiarism detection in arXiv," in Sixth IEEE International Conference on Data Mining (ICDM06), Hong Kong, China, Dec. 18-12 2006, pp. 1070-1075.
-
(2006)
Sixth IEEE International Conference on Data Mining (ICDM06)
, pp. 1070-1075
-
-
Sorokina, D.1
Gehrke, J.2
Warner, S.3
Ginsparg, P.4
-
4
-
-
33750311279
-
Near-duplicate detection by instance-level constrained clustering
-
Seattle, Washington, United States, Aug. 6-11
-
H. Yang and J. Callan, "Near-duplicate detection by instance-level constrained clustering," in Proceedings of the 29rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, Washington, United States, Aug. 6-11 2006, pp. 421-428.
-
(2006)
Proceedings of the 29rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 421-428
-
-
Yang, H.1
Callan, J.2
-
5
-
-
0039710683
-
SCAM: A copy detection mechanism for digital documents
-
Austin, Texas, USA, June 11-13
-
N. Shivakumar and H. Garcia-Molina, "SCAM: A copy detection mechanism for digital documents," in Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95), Austin, Texas, USA, June 11-13 1995.
-
(1995)
Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95)
-
-
Shivakumar, N.1
Garcia-Molina, H.2
-
6
-
-
84896162828
-
Mclean students sue anti-cheating service: Plaintiffs say company's database of term papers, essays violates copyright laws,
-
Mar. 29, Online, Available
-
M. Glod, "Mclean students sue anti-cheating service: Plaintiffs say company's database of term papers, essays violates copyright laws," The Washington Post, p. B05, Mar. 29 2007. [Online]. Available: http://www.washingtopost.com/wpdyn/content/article/2007/03/28/AR2007032802038. html
-
(2007)
The Washington Post
-
-
Glod, M.1
-
7
-
-
52649099765
-
-
ch. General Cryptograpic Protocols, Online, Available
-
O. Goldreich, The Foundations of Cryptography. Cambridge University Press, 2004, vol. 2, ch. General Cryptograpic Protocols. [Online]. Available: http://www.wisdom.weizmann.ac.il/oded/PSBookFrag/prot.ps
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
9
-
-
84976810280
-
Copy detection mechanisms for digital documents
-
San Jose, California, United States: ACM, May
-
S. Brin, J. Davis, and H. Garcia-Molina, "Copy detection mechanisms for digital documents," in Proceedings of the 1995 ACM SIGMOD Conference on Management of Data. San Jose, California, United States: ACM, May 1995, pp. 398-409.
-
(1995)
Proceedings of the 1995 ACM SIGMOD Conference on Management of Data
, pp. 398-409
-
-
Brin, S.1
Davis, J.2
Garcia-Molina, H.3
-
10
-
-
84892758238
-
CHECK: A document plagiarism detection system
-
San Jose, California, United States: ACM, February
-
A. Si, H. V. Leong, and R. Lau, "CHECK: A document plagiarism detection system," in Proceedings of ACM Symposium for Applied Computing. San Jose, California, United States: ACM, February 1997, pp. 70-77.
-
(1997)
Proceedings of ACM Symposium for Applied Computing
, pp. 70-77
-
-
Si, A.1
Leong, H.V.2
Lau, R.3
-
11
-
-
16444372473
-
SPlaT: A system for self-plagiarism detection
-
Algarve, Portugal, Nov. 5-8
-
C. Collberg, S. Kobourov, J. Louie, and T. Slattery, "SPlaT: A system for self-plagiarism detection," in Proceedings of IADIS International Conference WWW/INTERNET 2003, Algarve, Portugal, Nov. 5-8 2003, pp. 508-514.
-
(2003)
Proceedings of IADIS International Conference WWW/INTERNET 2003
, pp. 508-514
-
-
Collberg, C.1
Kobourov, S.2
Louie, J.3
Slattery, T.4
-
12
-
-
33750314850
-
Compact features for detection of near-duplicates in distributed retrieval
-
Glasgow, UK, Oct. 11-13
-
Y Bernstein, M. Shokouhi, and J. Zobel, "Compact features for detection of near-duplicates in distributed retrieval," in SPIRE, Glasgow, UK, Oct. 11-13 2006, pp. 110-121.
-
(2006)
SPIRE
, pp. 110-121
-
-
Bernstein, Y.1
Shokouhi, M.2
Zobel, J.3
-
13
-
-
0029696087
-
Building a scalable and accurate copy detection mechanism
-
Bethesda, Maryland, United States, Mar. 20-23
-
N. Shivakumar and H. Garcia-Molina, "Building a scalable and accurate copy detection mechanism," in Proceedings of the first ACM International Conference on Digital libraries, Bethesda, Maryland, United States, Mar. 20-23 1996, pp. 160-168.
-
(1996)
Proceedings of the first ACM International Conference on Digital libraries
, pp. 160-168
-
-
Shivakumar, N.1
Garcia-Molina, H.2
-
14
-
-
0032201622
-
-
Online, Available
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," vol. 45, no. 6, pp. 965-981, 1998. [Online]. Available: http://doi.acm.org/10.1145/293347.293350
-
(1998)
Private information retrieval
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
15
-
-
35048902690
-
-
Sept, Online, Available
-
N. Ahituv, Y Lapid, and S. Neumann, "Processing encrypted data," vol. 20, no. 9, pp. 777-780, Sept. 1987. [Online]. Available: http://doi.acm.org/10.1145/30401.30404
-
(1987)
Processing encrypted data
, vol.20
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
16
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, June 4-6, Online, Available
-
H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, 'Executing SQL over encrypted data in the database-service-provider model," in Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, June 4-6 2002, pp. 216-227. [Online]. Available: http://doi.acm.org/10.1145/564691.564717
-
(2002)
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
18
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada, July 23-26, Online, Available
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26 2002, pp. 639-644. [Online]. Available: http://doi.acm.org/10.1145/775047.775142
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
19
-
-
26444451487
-
On secure scalar product computation for privacy-preserving data mining
-
C. Park and S. Chee, Eds, Seoul, Korea, Dec. 2-3
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On secure scalar product computation for privacy-preserving data mining," in The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), C. Park and S. Chee, Eds., Seoul, Korea, Dec. 2-3 2004, pp. 104-120.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
20
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
Providence, Rhode Island, U.S.A, May 6-8
-
S. Goldwasser, S. Micali, and C Rackoff, "The knowledge complexity of interactive proof systems," in Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC' 85), Providence, Rhode Island, U.S.A., May 6-8 1985, pp. 291-304.
-
(1985)
Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC' 85)
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
Prague, Czech Republic, May 2-6
-
P. Paillier, "Public key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology ?Eurocrypt '99 Proceedings, LNCS 1592. Prague, Czech Republic, May 2-6 1999, pp. 223-238.
-
(1999)
Advances in Cryptology ?Eurocrypt '99 Proceedings, LNCS 1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. C. Pohlig and M. E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Transactions on Information Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
|