-
1
-
-
77952903083
-
-
Available at
-
BAKER, W., HYLENDER, D., and VALENTINE, A. 2008 Data Breach Investigations Report. Available at http://www. verizonbusiness.com/resources/security/databreachreport.pdf, 2008.
-
(2008)
Data Breach Investigations Report
, pp. 2008
-
-
BAKER, W.1
HYLENDER, D.2
VALENTINE, A.3
-
2
-
-
84898960610
-
-
Ben-Or, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
-
Ben-Or, M., GOLDWASSER, S., AND WIGDERSON, A. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the 20th annual ACM symposium on Theory of computing, 1988.
-
-
-
-
3
-
-
70349256822
-
-
BOGETOFT, P., CHRISTENSEN, D., DAMGARD, I., GEISLER, M., JAKOBSEN, T., KROIGAARD, M., NIELSEN, J., NIELSEN, J., NIELSEN, K., PAGTER, J., SCHWARTZBACH, M., AND TOFT., T. Multiparty Computation Goes Live. Available at http://eprint.iacr.org/2008/ 068, 2008.
-
BOGETOFT, P., CHRISTENSEN, D., DAMGARD, I., GEISLER, M., JAKOBSEN, T., KROIGAARD, M., NIELSEN, J., NIELSEN, J., NIELSEN, K., PAGTER, J., SCHWARTZBACH, M., AND TOFT., T. Multiparty Computation Goes Live. Available at http://eprint.iacr.org/2008/ 068, 2008.
-
-
-
-
5
-
-
0038687775
-
-
CAMENISCH, J., AND VAN HERREWEGHEN, E. Design and Implementation of the idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
-
CAMENISCH, J., AND VAN HERREWEGHEN, E. Design and Implementation of the idemix Anonymous Credential System. In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002.
-
-
-
-
6
-
-
0000879068
-
Optimal policies for a multi-echelon inventory problem
-
CLARK, A., AND SCARF, H. Optimal policies for a multi-echelon inventory problem. Management Science 6(4), 1960.
-
(1960)
Management Science
, vol.6
, Issue.4
-
-
CLARK, A.1
SCARF, H.2
-
7
-
-
70349230419
-
-
CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. Multiparty computation from threshold homomorphic encryption. In Proceedings of Eurocrypt, 2001.
-
CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. Multiparty computation from threshold homomorphic encryption. In Proceedings of Eurocrypt, 2001.
-
-
-
-
8
-
-
70349238232
-
-
DAMGARD, I., AND JURIK, M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, 2001.
-
DAMGARD, I., AND JURIK, M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Proceedings of 4th International Workshop on Practice and Theory in Public Key Cryptography, 2001.
-
-
-
-
10
-
-
73649110531
-
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses
-
DEITOS, R., KERSCHBAUM, F., ROBINSON, P., AND HALLER, J. A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006.
-
(2006)
Proceedings of the 3rd ACM Workshop On Secure Web Services
-
-
DEITOS, R.1
KERSCHBAUM, F.2
ROBINSON, P.3
HALLER, J.4
-
13
-
-
70349250814
-
-
IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See, 2006
-
IBM. IBM Anonymous Resolution Version 4.1 Technical Information. See http://ibm.com/db2/eas/, 2006.
-
-
-
-
14
-
-
33646021047
-
Comparison of Performance of Web Services, WS-Security, RMI, and RMI-SSL
-
JURIC, M., ROZMAN, I. BRUMEN, B., COLNARIC, M., AND HERICKO, M. Comparison of Performance of Web Services, WS-Security, RMI, and RMI-SSL. Journal of Systems and Software 79(5), 2006.
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.5
-
-
JURIC, M.1
ROZMAN, I.2
BRUMEN, B.3
COLNARIC, M.4
HERICKO, M.5
-
15
-
-
47949114798
-
-
KERSCHBAUM, F. Building A Privacy-Preserving Benchmarking Enterprise System. In Proceedings of the 11th IEEE International EDOC Conference, 2007.
-
KERSCHBAUM, F. Building A Privacy-Preserving Benchmarking Enterprise System. In Proceedings of the 11th IEEE International EDOC Conference, 2007.
-
-
-
-
16
-
-
77954697808
-
-
KERSCHBAUM, F. Distance-Preserving Pseudonymization for Timestamps and Spatial Data. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007.
-
KERSCHBAUM, F. Distance-Preserving Pseudonymization for Timestamps and Spatial Data. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2007.
-
-
-
-
17
-
-
48249134708
-
-
KERSCHBAUM, F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference, 2008.
-
KERSCHBAUM, F. Practical Privacy-Preserving Benchmarking. In Proceedings of the 23rd IFIP International Information Security Conference, 2008.
-
-
-
-
18
-
-
70349234974
-
-
An Experimental Study on the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols
-
KERSCHBAUM, F., DAHLMEIER, D., SCHRÖPFER, A., AND BISWAS, D. An Experimental Study on the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. SAP Internal Technical Report, 2008.
-
(2008)
SAP Internal Technical Report
-
-
KERSCHBAUM, F.1
DAHLMEIER, D.2
SCHRÖPFER, A.3
BISWAS, D.4
-
19
-
-
70349248951
-
-
KERSCHBAUM, F., HALLER, J., KARABULUT, Y., AND ROBINSON, P. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In Proceedings of the 4th International Conference on Trust Management, 2006.
-
KERSCHBAUM, F., HALLER, J., KARABULUT, Y., AND ROBINSON, P. PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In Proceedings of the 4th International Conference on Trust Management, 2006.
-
-
-
-
20
-
-
70349244712
-
-
KERSCHBAUM, F. AND SCHAAD, A. Privacy-Preserving Social Network Analysis for Criminal Investigations. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2008.
-
KERSCHBAUM, F. AND SCHAAD, A. Privacy-Preserving Social Network Analysis for Criminal Investigations. In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2008.
-
-
-
-
21
-
-
48049095494
-
-
KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Logical Vector Clocks using Secure Computation Techniques. In Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007.
-
KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Logical Vector Clocks using Secure Computation Techniques. In Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007.
-
-
-
-
22
-
-
70349242396
-
-
KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Data Analytics as an Outsourced Service. In Proceedings of the ACM Workshop on Secure Web Services, 2008.
-
KERSCHBAUM, F., AND VAYSSIERE, J. Privacy-Preserving Data Analytics as an Outsourced Service. In Proceedings of the ACM Workshop on Secure Web Services, 2008.
-
-
-
-
23
-
-
50249162488
-
-
LI, J., AND ATALLAH, M. J. Secure and private collaborative linear programming. In Proceedings of International Conference on Collaborative Computing, 2006.
-
LI, J., AND ATALLAH, M. J. Secure and private collaborative linear programming. In Proceedings of International Conference on Collaborative Computing, 2006.
-
-
-
-
24
-
-
0031108822
-
Information distortion in a supply chain
-
PADMANABHAN, H., AND WHANG, S. Information distortion in a supply chain. Management Science 43(4), 1997.
-
(1997)
Management Science
, vol.43
, Issue.4
-
-
PADMANABHAN, H.1
WHANG, S.2
-
25
-
-
70349233400
-
-
PAILLIER, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt, 1999.
-
PAILLIER, P. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt, 1999.
-
-
-
-
27
-
-
0030086382
-
Role Based Access Control Models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. Role Based Access Control Models. IEEE Computer 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
SANDHU, R.1
COYNE, E.2
FEINSTEIN, H.3
YOUMAN, C.4
-
28
-
-
70349234973
-
-
and Applications for Multi-Party Computation. PhD. Thesis of the University of Aarhus
-
TOFT, T. Primitives and Applications for Multi-Party Computation. PhD. Thesis of the University of Aarhus, 2007.
-
(2007)
-
-
TOFT, T.P.1
-
29
-
-
0020312165
-
-
YAO, A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science, 1982.
-
YAO, A. Protocols for Secure Computations. In Proceedings of the annual IEEE Symposium on Foundations of Computer Science, 1982.
-
-
-
|