-
2
-
-
1642327704
-
Secure and private sequence comparisons
-
Washington, DC, ACM Press
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In Proceedings of the 2003 ACM Workshop on privacy in the electronic society, pages 39-44, Washington, DC, 2003. ACM Press.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
5
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
IEEE Computer Society
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In 25th Annual Symposium on Foundations of Computer Science FOCS'85, pages 383-395. IEEE Computer Society, 1985.
-
(1985)
25th Annual Symposium on Foundations of Computer Science FOCS'85
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
6
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
of Lecture Notes in Computer Science, Springer-Verlag
-
I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In Proceedings of the third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 285-304. Springer-Verlag, 2006.
-
(2006)
Proceedings of the Third Theory of Cryptography Conference, TCC 2006
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
8
-
-
0023545076
-
How to play any mental game
-
New York, U. S. A., ACM Press
-
O. Goldreich, S. Micali, and A. Widgerson. How to play any mental game. In Proceedings of the nineteenth annual ACM conference on Theory of Computing, pages 218-229, New York, U. S. A., 1987. ACM Press.
-
(1987)
Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Widgerson, A.3
-
12
-
-
84937417083
-
Mix and match: Secure function evaluation via ciphertexts
-
T. Okamoto, editor, of Lecture Notes in Computer Science, Springer-Verlag
-
M. Jacobsson and A. Juels. Mix and match: Secure function evaluation via ciphertexts. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT'00, volume 1976 of Lecture Notes in Computer Science, pages 162-177. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - ASIACRYPT'00
, vol.1976
, pp. 162-177
-
-
Jacobsson, M.1
Juels, A.2
-
13
-
-
34547335279
-
Secure function evaluation with ordered binary decision diagrams
-
Virginia, U. S. A., November 2006, ACM Press
-
L. Kruger, S. Jha, E.-J. Goh, and D. Boneh. Secure function evaluation with ordered binary decision diagrams. In Proceedings of the 13th ACM conference on Computer and communications security CCS'06, pages 410-420, Virginia, U. S. A., November 2006. ACM Press.
-
Proceedings of the 13th ACM Conference on Computer and Communications Security CCS'06
, pp. 410-420
-
-
Kruger, L.1
Jha, S.2
Goh, E.-J.3
Boneh, D.4
-
14
-
-
0000390142
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. I. Levenshtein. Binary codes capable of correcting deletions, insertions and reversals. Doklady Akademii Nauk SSSR, 163 (4):845-848, 1965.
-
(1965)
Doklady Akademii Nauk SSSR
, vol.163
, Issue.4
, pp. 845-848
-
-
Levenshtein, V.I.1
-
16
-
-
0030092596
-
On some application of finite-state automata theory to natural language
-
M. Mohri. On some application of finite-state automata theory to natural language. Natural Language Engineering, 2 (1):1-20, 1996.
-
(1996)
Natural Language Engineering
, vol.2
, Issue.1
, pp. 1-20
-
-
Mohri, M.1
-
17
-
-
0348198473
-
Finite-state transducers in language and speech processing
-
M. Mohri. Finite-state transducers in language and speech processing. Computational Linguistics, 23 (2):269-311, 1997.
-
(1997)
Computational Linguistics
, vol.23
, Issue.2
, pp. 269-311
-
-
Mohri, M.1
-
19
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In ACM Symposium on Theory of Computing, pages 590-599, 2001.
-
(2001)
ACM Symposium on Theory of Computing
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
20
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Washington, D. C., U. S. A.
-
M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, pages 448-457, Washington, D. C., U. S. A., 2001.
-
(2001)
Proceedings of the Twelfth Annual ACM-SIAM Symposium on Discrete Algorithms
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
21
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
S. B. Needleman and C. D. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. Journal on Molecular Biology, 48:443-453, 1970.
-
(1970)
Journal on Molecular Biology
, vol.48
, pp. 443-453
-
-
Needleman, S.B.1
Wunsch, C.D.2
-
24
-
-
0344005042
-
Speech discrimination by dynamic programming
-
T. K. Vintsyuk. Speech discrimination by dynamic programming. Kibernetika, 4:52-57, 1968.
-
(1968)
Kibernetika
, vol.4
, pp. 52-57
-
-
Vintsyuk, T.K.1
-
26
-
-
0028400927
-
The state complexities of some basic operations on regular languages
-
S. Yu and Q. Zhuang. The state complexities of some basic operations on regular languages. Theoretical Computer Science, 125:315-328, 1994.
-
(1994)
Theoretical Computer Science
, vol.125
, pp. 315-328
-
-
Yu, S.1
Zhuang, Q.2
|