-
1
-
-
84886023553
-
Generating satisfiable problem instances
-
In: AAAI Press, Menlo Park
-
Achlioptas, D., Gomes, C., Kautz, H., Selman, B.: Generating satisfiable problem instances. In: Proceedings of the 7th Conference on Artificial Intelligence (AAAI-00) and of the 12th Conference on Innovative Applications of Artificial Intelligence (IAAI-00), pp. 256-261. AAAI Press, Menlo Park (2000)
-
(2000)
Proceedings of the 7th Conference on Artificial Intelligence (AAAI-00) and of the 12th Conference on Innovative Applications of Artificial Intelligence (IAAI-00)
, pp. 256-261
-
-
Achlioptas, D.1
Gomes, C.2
Kautz, H.3
Selman, B.4
-
2
-
-
0024914229
-
Security-control methods for statistical databases
-
Adam N.R., Wortman J.C.: Security-control methods for statistical databases. ACM Comput. Surv. 21(4), 515-556 (1989)
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
3
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Symposium on Principles of Database Systems, pp. 247-255 (2001)
-
(2001)
Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
5
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
Benaloh, J.C., dA Mare, M.: One-way accumulators: a decentralized alternative to digital signatures. In: Advances in Cryptology - EUROCRYPT '93, pp. 274-285 (1994). http://citeseer.nj.nec.com/article/ benaloh93oneway.html
-
(1994)
Advances in Cryptology - EUROCRYPT '93
, pp. 274-285
-
-
Benaloh, J.C.1
de Mare, M.2
-
7
-
-
84949995981
-
An efficient probabilistic public-key encryption scheme which hides all partial information
-
In: Blakely, G.R., Chaum, D. (eds.) Springer, Berlin
-
Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption scheme which hides all partial information. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology: Proceedings of CRYPTO 84. Lecture Notes in Computer Science, vol. 196, pp. 289-302. Springer, Berlin (1985)
-
(1985)
Advances in Cryptology: Proceedings of CRYPTO 84. Lecture Notes in Computer Science
, vol.196
, pp. 289-302
-
-
Blum, M.1
Goldwasser, S.2
-
8
-
-
0018443657
-
A note on the complexity of cryptography
-
Brassard G.: A note on the complexity of cryptography. IEEE Trans. Inform. Theory 25(2), 232-233 (1979)
-
(1979)
IEEE Trans. Inform. Theory
, vol.25
, Issue.2
, pp. 232-233
-
-
Brassard, G.1
-
9
-
-
33646203368
-
-
Technical Report TR78-338, Cornell University, Computer Science Department
-
Brassard, G., Fortune, S., Hopcroft, J.E.: A note on cryptography and NP∩ coNP-P. Technical Report TR78-338, Cornell University, Computer Science Department (1978)
-
(1978)
A Note on Cryptography and NP∩ CoNP-P
-
-
Brassard, G.1
Fortune, S.2
Hopcroft, J.E.3
-
10
-
-
0026913667
-
Symbolic Boolean manipulation with ordered binary-decision diagrams
-
Bryant R.E. (1992) Symbolic Boolean manipulation with ordered binary-decision diagrams. ACM Comput. Surv. 24(3), 293-318 (1992). http:/ /citeseer.nj.nec.com/bryant92symbolic.html
-
(1992)
ACM Comput. Surv.
, vol.24
, Issue.3
, pp. 293-318
-
-
Bryant, R.E.1
-
11
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
In: Yung, M. (ed.) International Association for Cryptologic Research, Springer, Germany
-
Camenisch, J., Lysyanskaya, A.: Dynamic accumulators and application to efficient revocation of anonymous credentials. In: Yung, M. (ed.) Advances in Cryptology - CRYPTO '2002, Lecture Notes in Computer Science, vol. 2442, pp. 61-76. International Association for Cryptologic Research, Springer, Germany (2002). http://www.springerlink.com/ link.asp?id=yklb7xdvbbc0wwgy
-
(2002)
Advances in Cryptology - CRYPTO '2002, Lecture Notes in Computer Science
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
12
-
-
0022754707
-
Security problems on inference control for sum, max, and min queries
-
doi: 10.1145/5925.5928
-
Chin F.: Security problems on inference control for sum, max, and min queries. J. ACM 33(3), 451-464 (1986). doi: 10.1145/5925.5928
-
(1986)
J. ACM
, vol.33
, Issue.3
, pp. 451-464
-
-
Chin, F.1
-
13
-
-
0004356882
-
Finding hard instances of the satisfiability problem: A survey
-
In: Du, D., Gu, J., Pardalos, P.M. (eds) American Mathematical Society, Providence
-
Cook S.A., Mitchell D.G.: Finding hard instances of the satisfiability problem: A survey. In: Du, D., Gu, J., Pardalos, P.M. (eds) Satisfiability Problem: Theory and Applications, Dimacs Series in Discrete Mathematics and Theoretical Computer Science, vol 35, pp. 1-17. American Mathematical Society, Providence (1997)
-
(1997)
Satisfiability Problem: Theory and Applications, Dimacs Series in Discrete Mathematics and Theoretical Computer Science
, vol.35
, pp. 1-17
-
-
Cook, S.A.1
Mitchell, D.G.2
-
14
-
-
0027708548
-
Experimental results on the crossover point in satisfiability problems
-
In: Fikes, R., Lehnert, W. (eds) American Association for Artificial Intelligence, AAAI Press, Menlo Park
-
Crawford J.M., Anton L.D.: Experimental results on the crossover point in satisfiability problems. In: Fikes, R., Lehnert, W. (eds) Proceedings of the Eleventh National Conference on Artificial Intelligence, pp. 21-27. American Association for Artificial Intelligence, AAAI Press, Menlo Park (1993)
-
(1993)
Proceedings of the Eleventh National Conference on Artificial Intelligence
, pp. 21-27
-
-
Crawford, J.M.1
Anton, L.D.2
-
15
-
-
38149082680
-
Efficient negative databases from cryptographic hash functions
-
In: LNCS (ed.)
-
Danezis, G., Diaz, G., Faust, S., Käsper, E., Troncoso, C., Preneel, B.: Efficient negative databases from cryptographic hash functions. In: LNCS (ed.). Information Security Conference, vol. 4779, pp. 423-436 (2007)
-
(2007)
Information Security Conference
, vol.4779
, pp. 423-436
-
-
Danezis, G.1
Diaz, G.2
Faust, S.3
Käsper, E.4
Troncoso, C.5
Preneel, B.6
-
17
-
-
0020779363
-
Inference controls for statistical databases
-
Denning D., Schlorer J.: Inference controls for statistical databases. Computer 16(7), 69-82 (1983)
-
(1983)
Computer
, vol.16
, Issue.7
, pp. 69-82
-
-
Denning, D.1
Schlorer, J.2
-
19
-
-
0018444418
-
Secure databases: Protection against user influence
-
Dobkin D., JPnes A., Lipton R.: Secure databases: protection against user influence. ACM Trans. Database Syst. 4(1), 97-106 (1979)
-
(1979)
ACM Trans. Database Syst.
, vol.4
, Issue.1
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.2
Lipton, R.3
-
21
-
-
33750243562
-
On-line negative databases (with experimental results)
-
Esponda F., Ackley E.S., Forrest S., Helman P.: On-line negative databases (with experimental results). Int. J. Unconvent. Comput. 1(3), 201-220 (2005)
-
(2005)
Int. J. Unconvent. Comput.
, vol.1
, Issue.3
, pp. 201-220
-
-
Esponda, F.1
Ackley, E.S.2
Forrest, S.3
Helman, P.4
-
22
-
-
33750225274
-
-
Technical report, University of New Mexico
-
Esponda, F., Forrest, S., Helman, P.: Enhancing privacy through negative representations of data. Technical report, University of New Mexico (2004)
-
(2004)
Enhancing Privacy Through Negative Representations of Data
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
24
-
-
35348817340
-
Protecting data privacy through hard-to-reverse negative databases
-
Esponda F., Forrest S., Helman P.: Protecting data privacy through hard-to-reverse negative databases. Int. J. Inform. Security 6 (6), 403-415 (2007)
-
(2007)
Int. J. Inform. Security
, vol.6
, Issue.6
, pp. 403-415
-
-
Esponda, F.1
Forrest, S.2
Helman, P.3
-
25
-
-
42949131969
-
-
Tech. Rep. TR-CS-2007-18, University of New Mexico
-
Esponda, F., Trias, E., Ackley, E., Forrest, S.: A relational algebra for negative databases. Tech. Rep. TR-CS-2007-18, University of New Mexico (2007)
-
(2007)
A Relational Algebra for Negative Databases
-
-
Esponda, F.1
Trias, E.2
Ackley, E.3
Forrest, S.4
-
26
-
-
85009782374
-
Cryptography and np-completeness
-
In: Springer, Berlin
-
Even, S., Yacobi, Y.: Cryptography and np-completeness. In: Proc. 7th Colloq. Automata, Languages, and Programming. Lecture Notes in Computer Science, vol. 85, pp. 195-207. Springer, Berlin (1980)
-
(1980)
Proc. 7th Colloq. Automata, Languages, and Programming. Lecture Notes in Computer Science
, vol.85
, pp. 195-207
-
-
Even, S.1
Yacobi, Y.2
-
27
-
-
27844589079
-
-
ftp://cm.bell-labs.com/cm/cs/doc/91/4-12.ps.gz
-
Feigenbaum, J., Grosse, E., Reeds, J.A.: Cryptographic protection of membership lists 9 (1), 16-20 (1992). ftp://cm.bell-labs.com/cm/cs/doc/ 91/4-12.ps.gz
-
(1992)
Cryptographic Protection of Membership Lists
, vol.9
, Issue.1
, pp. 16-20
-
-
Feigenbaum, J.1
Grosse, E.2
Reeds, J.A.3
-
28
-
-
33646492430
-
Cryptographic protection of databases and software
-
In: American Mathematical Society, Providence
-
Feigenbaum, J., Liberman, M.Y., Wright, R.N.: Cryptographic protection of databases and software. In: Distributed Computing and Cryptography, pp. 161-172. American Mathematical Society, Providence (1991)
-
(1991)
Distributed Computing and Cryptography
, pp. 161-172
-
-
Feigenbaum, J.1
Liberman, M.Y.2
Wright, R.N.3
-
29
-
-
0042514966
-
How to fake an RSA signature by encoding modular root finding as a SAT problem
-
Fiorini C., Martinelli E., Massacci F.: How to fake an RSA signature by encoding modular root finding as a SAT problem. Discrete Appl. Math. 130 (2), 101-127 (2003)
-
(2003)
Discrete Appl. Math.
, vol.130
, Issue.2
, pp. 101-127
-
-
Fiorini, C.1
Martinelli, E.2
Massacci, F.3
-
30
-
-
0021444827
-
Logic and databases: A deductive approach
-
Gallaire H., MiAker J., Nicolas J.: Logic and databases: a deductive approach. Comput. Surv. 16(2), 154-185 (1984)
-
(1984)
Comput. Surv.
, vol.16
, Issue.2
, pp. 154-185
-
-
Gallaire, H.1
Minker, J.2
Nicolas, J.3
-
33
-
-
0021409284
-
Probabilistic encryption
-
See also preliminary version in 14th STOC, 1982
-
Goldwasser S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2):270-299 (1984). See also preliminary version in 14th STOC, 1982
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
34
-
-
0024866111
-
Pseudo-random generation from one-way functions
-
In: ACM Press, New York doi: 10.1145/73007.73009
-
Impagliazzo, R., Levin, L.A., Luby, M.: Pseudo-random generation from one-way functions. In: Proceedings of the twenty-first annual ACM symposium on Theory of computing, pp. 12-24. ACM Press, New York (1989). doi: 10.1145/73007.73009
-
(1989)
Proceedings of the Twenty-first Annual ACM Symposium on Theory of Computing
, pp. 12-24
-
-
Impagliazzo, R.1
Levin, L.A.2
Luby, M.3
-
35
-
-
0024768555
-
Efficient cryptographic schemes provably as secure as subset sum
-
In: IEEE (ed.) October 30-November 1, 1989, Research Triangle Park, NC IEEE Computer Society Press, USA
-
Impagliazzo, R., Naor, M.: Efficient cryptographic schemes provably as secure as subset sum. In: IEEE (ed.) 30th annual Symposium on Foundations of Computer Science, October 30-November 1, 1989, Research Triangle Park, NC, pp. 236-241. IEEE Computer Society Press, USA (1989)
-
(1989)
30th Annual Symposium on Foundations of Computer Science
, pp. 236-241
-
-
Impagliazzo, R.1
Naor, M.2
-
36
-
-
33750271288
-
Generating hard satisfiable formulas by hiding solutions deceptively
-
Jia, H., Moore, C., Strain, D.: Generating hard satisfiable formulas by hiding solutions deceptively. In: AAAI (2005)
-
(2005)
AAAI
-
-
Jia, H.1
Moore, C.2
Strain, D.3
-
37
-
-
0000718899
-
The map method for synthesis of combinational logic circuits
-
Karnaugh, M.: The map method for synthesis of combinational logic circuits. Trans. AIEE, pp. 593-598 (1953)
-
(1953)
Trans. AIEE
, pp. 593-598
-
-
Karnaugh, M.1
-
38
-
-
0028098408
-
On the learnability of discrete distributions
-
In: ACM Press, New York doi: 10.1145/195058.195155
-
Kearns, M., Mansour, Y., Ron, D., Rubinfeld, R., Schapire, R.E., Sellie, L.: On the learnability of discrete distributions. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of computing, pp. 273-282. ACM Press, New York (1994). doi: 10.1145/195058.195155
-
(1994)
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing
, pp. 273-282
-
-
Kearns, M.1
Mansour, Y.2
Ron, D.3
Rubinfeld, R.4
Schapire, R.E.5
Sellie, L.6
-
39
-
-
35048820609
-
Efficient private matching and set intersection
-
In: Springer, Berlin
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Advances in Cryptology - Eurocrypt - 2004 Proceedings. LNCS, vol. 3027, pp. 1-19. Springer, Berlin (2004)
-
(2004)
Advances in Cryptology - Eurocrypt - 2004 Proceedings. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
41
-
-
33750232780
-
Inference control via query restriction vs. data modification: A perspective
-
In: North-Holland Publishing Co., Amsterdam
-
Matloff, N.S.: Inference control via query restriction vs. data modification: A perspective. In: On Database Security: Status and Prospects, pp. 159-166. North-Holland Publishing Co., Amsterdam (1988)
-
(1988)
On Database Security: Status and Prospects
, pp. 159-166
-
-
Matloff, N.S.1
-
42
-
-
33845331515
-
Minimization of boolean functions
-
McCluskey, E.: Minimization of boolean functions. Bell System Technical Journal, pp. 1417-1444 (1956)
-
(1956)
Bell System Technical Journal
, pp. 1417-1444
-
-
McCluskey, E.1
-
43
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
Merkle R.C., Hellman M.E.: Hiding information and signatures in trapdoor knapsacks. IEEE Trans. Inf. Theory 24(5), 525-530 (1978)
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.5
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
44
-
-
70350365723
-
Zero-knowledge sets
-
Micali, S., Rabin, M., Kilian, J.: Zero-knowledge sets. In: Proceedings of the FOCS 2003, p. 80 (2003)
-
(2003)
Proceedings of the FOCS 2003
, pp. 80
-
-
Micali, S.1
Rabin, M.2
Kilian, J.3
-
45
-
-
0027002161
-
Problem solving: Hardness and easiness - Hard and easy distributions of SAT problems
-
In: San Jose, California AAAI Press, Menlo Park
-
Mitchell, DH, Selman, B., Levesque, H.: Problem solving: hardness and easiness - hard and easy distributions of SAT problems. In: Proceeding of the 10th National Conference on Artificial Intelligence (AAAI-92), San Jose, California, pp. 459-465. AAAI Press, Menlo Park (1992)
-
(1992)
Proceeding of the 10th National Conference on Artificial Intelligence (AAAI-92)
, pp. 459-465
-
-
Mitchell, D.1
Selman, B.2
Levesque, H.3
-
46
-
-
70349592023
-
-
Tech. rep
-
Morselli, R., Bhattacharjee, S., Katz, J., Keleher, P.: Trust preserving set operations. Tech. rep.
-
Trust Preserving Set Operations
-
-
Morselli, R.1
Bhattacharjee, S.2
Katz, J.3
Keleher, P.4
-
47
-
-
0029711243
-
Evaluation may be easier than generation (extended abstract)
-
In: ACM Press, New York doi: 10.1145/237814.237833
-
Naor, M.: Evaluation may be easier than generation (extended abstract). In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of computing, pp. 74-83. ACM Press, New York (1996). doi: 10.1145/ 237814.237833
-
(1996)
Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing
, pp. 74-83
-
-
Naor, M.1
-
48
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
In: Seattle, Washington, May 15-17 ACM Press, New York (1989)
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing, Seattle, Washington, May 15-17, 1989, pp. 33-43. ACM Press, New York (1989)
-
(1989)
Proceedings of the Twenty First Annual ACM Symposium on Theory of Computing
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
49
-
-
0002114928
-
The rise and fall of knapsack cryptosystems
-
In: Pomerance, C., Goldwasser, S., (eds.) pub-AMS
-
Odlyzko, A.M.: The rise and fall of knapsack cryptosystems. In: Pomerance, C., Goldwasser, S., (eds.) Cryptology and Computational Number Theory. Proceedings of Symposia in Applied Mathematics. AMS short course lecture notes, vol. 42, pp. 75-88. pub-AMS (1990)
-
(1990)
Cryptology and Computational Number Theory. Proceedings of Symposia in Applied Mathematics. AMS Short Course Lecture Notes
, vol.42
, pp. 75-88
-
-
Odlyzko, A.M.1
-
50
-
-
35048885162
-
Efficient consistency proofs for generalized queries on a committed database
-
Ostrovsky, R., Rackoff, C., Smith, A.: Efficient consistency proofs for generalized queries on a committed database. In: ICALP: Annual International Colloquium on Automata, Languages and Programming, pp. 1041-1053 (2004)
-
(2004)
ICALP: Annual International Colloquium on Automata, Languages and Programming
, pp. 1041-1053
-
-
Ostrovsky, R.1
Rackoff, C.2
Smith, A.3
-
51
-
-
0000316190
-
A way to simplify truth functions
-
Quine, W.V.: A way to simplify truth functions. American Mathematical Monthly, pp. 627-631 (1955)
-
(1955)
American Mathematical Monthly
, pp. 627-631
-
-
Quine, W.V.1
-
54
-
-
0028393221
-
A modified random perturbation method for database security
-
doi: 10.1145/174638.174641
-
Tendick P., Matloff N.: A modified random perturbation method for database security. ACM Trans. Database Syst. 19(1), 47-63 (1994). doi: 10.1145/174638.174641
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.1
, pp. 47-63
-
-
Tendick, P.1
Matloff, N.2
-
55
-
-
70349590717
-
Secure set intersection cardinality with application to association rule mining
-
(to appear)
-
Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Security (2004, to appear)
-
(2004)
J. Comput. Security
-
-
Vaidya, J.1
Clifton, C.2
-
57
-
-
0020312165
-
Protocols for secure computations
-
In: IEEE (ed.) November 3-5 Chicago, IL IEEE Computer Society Press, USA (1982)
-
Yao, A.: Protocols for secure computations. In: IEEE (ed.) 23rd annual Symposium on Foundations of Computer Science, November 3-5, 1982, Chicago, IL, pp. 160-164. IEEE Computer Society Press, USA (1982)
-
(1982)
23rd Annual Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.1
|