-
3
-
-
1642327704
-
Secure and private sequence comparisons
-
ACM, New York
-
Atallah, M., Kerschbaum, F., Du, W.: Secure and private sequence comparisons. In: WPES 2003: Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pp. 39-44. ACM, New York (2003)
-
(2003)
WPES 2003: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
, pp. 39-44
-
-
Atallah, M.1
Kerschbaum, F.2
Du, W.3
-
4
-
-
84948952992
-
Minimal-latency secure function evaluation
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Beaver, D.: Minimal-latency secure function evaluation. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 335-350. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 335-350
-
-
Beaver, D.1
-
5
-
-
84974577749
-
One-round secure computation and secure autonomous mobile agents
-
Welzl, E, Montanari, U, Rolim, J.D.P, eds, ICALP 2000, Springer, Heidelberg
-
Cachin, C., Camenisch, J., Kilian, J., Müller, J.: One-round secure computation and secure autonomous mobile agents. In: Welzl, E., Montanari, U., Rolim, J.D.P. (eds.) ICALP 2000. LNCS, vol. 1853, p. 512. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1853
, pp. 512
-
-
Cachin, C.1
Camenisch, J.2
Kilian, J.3
Müller, J.4
-
6
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
7
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
ACM Press, New York
-
Canetti, R., Ishai, Y., Kumar, R., Reiter, M., Rubinfeld, R., Wright, R.: Selective private function evaluation with applications to private statistics. In: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, pp. 293-304. ACM Press, New York (2001)
-
(2001)
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
9
-
-
0032201622
-
Private information retrieval
-
Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM 45(6), 965-981 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218-229. ACM Press, New York (1987)
-
(1987)
Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
50249177701
-
Towards practical privacy for genomic computation
-
May, 2008
-
Jha, S., Kruger, L., Shmatikov, V.: Towards practical privacy for genomic computation. In: IEEE Symposium on Security and Privacy, SP 2008, May 2008, pp. 216-230 (2008)
-
(2008)
IEEE Symposium on Security and Privacy, SP
, pp. 216-230
-
-
Jha, S.1
Kruger, L.2
Shmatikov, V.3
-
12
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
IEEE Computer Society, Los Alamitos
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS 1997), pp. 364-373. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
FOCS 1997: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
13
-
-
24744472288
-
A proof of yao's protocol for secure two-party computation. Cryptology ePrint Archive
-
Report 2004/175
-
Lindell, Y., Pinkas, B.: A proof of yao's protocol for secure two-party computation. Cryptology ePrint Archive, Report 2004/175 (2004), http://eprint.iacr.org/
-
(2004)
-
-
Lindell, Y.1
Pinkas, B.2
-
14
-
-
85084163840
-
Fairplay - a secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: Proceedings of Usenix Security (2004)
-
(2004)
Proceedings of Usenix Security
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
15
-
-
64049119146
-
Efficient oblivious transfer protocols
-
Philadelphia, PA, USA, pp, Society for Industrial and Applied Mathematics
-
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA 2001: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms, Philadelphia, PA, USA, pp. 448-457. Society for Industrial and Applied Mathematics (2001)
-
(2001)
SODA 2001: Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
16
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
17
-
-
0033309271
-
Non-interactive cryptocomputing for NC1
-
Sander, T., Young, A., Yung, M.: Non-interactive cryptocomputing for NC1. In: 40th Annual Symposium on Foundations of Computer Science, pp. 554-566 (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science
, pp. 554-566
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
18
-
-
57049083569
-
Privacy preserving error resilient dna searching through oblivious automata
-
ACM, New York
-
Troncoso-Pastoriza, J., Katzenbeisser, S., Celik, M.: Privacy preserving error resilient dna searching through oblivious automata. In: CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security, pp. 519-528. ACM, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 519-528
-
-
Troncoso-Pastoriza, J.1
Katzenbeisser, S.2
Celik, M.3
|