-
1
-
-
0024914229
-
Security-control methods for statistical databases
-
10.1145/76894.76895
-
N.R. Adam J.C. Wortman 1989 Security-control methods for statistical databases ACM Comput. Surv. 21 4 515 556 10.1145/76894.76895
-
(1989)
ACM Comput. Surv.
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortman, J.C.2
-
2
-
-
84880492439
-
Make it fresh, make it quick-searching a networks of personal webservers
-
Bawa, M., Bayardo, R.J. Jr., Rajagopalan, S., Shekita, E.J.: Make it fresh, make it quick-searching a networks of personal webservers. In: Proceedings of the Conference on World Wide Web (WWW) (2003)
-
(2003)
Proceedings of the Conference on World Wide Web (WWW)
-
-
Bawa, M.1
Bayardo Jr., R.J.2
Rajagopalan, S.3
Shekita, E.J.4
-
3
-
-
2942747447
-
YouServ: A web-hosting and content sharing tool for the masses
-
Honolulu, Hawaii, USA
-
Bayardo, R.J. Jr., Agrawal, R., Gruhl, D., Somani, A.: YouServ: A web-hosting and content sharing tool for the masses. In: Proceedings of the 11th International Conference on World Wide Web, Honolulu, Hawaii, USA, pp. 345-354 (2002)
-
(2002)
Proceedings of the 11th International Conference on World Wide Web
, pp. 345-354
-
-
Bayardo Jr, R.J.1
Agrawal, R.2
Gruhl, D.3
Somani, A.4
-
6
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
0195.47003 10.1145/362686.362692
-
B. Bloom 1970 Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 7 422 426 0195.47003 10.1145/362686.362692
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
9
-
-
0029541045
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of the Conference on Foundations of Computer Science (FOCS) (1995)
-
(1995)
Proceedings of the Conference on Foundations of Computer Science (FOCS)
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
84955615464
-
Copyright protection for electronic publishing over computer networks
-
Choudhury, A., Maxemchuk, N., Paul, S., Schulzrinne, H.: Copyright protection for electronic publishing over computer networks. AT&T Bell Laboratories Technical Report (1994)
-
(1994)
AT&T Bell Laboratories Technical Report
-
-
Choudhury, A.1
Maxemchuk, N.2
Paul, S.3
Schulzrinne, H.4
-
11
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption. Advances in Cryptology-EUROCRYPT 2001
-
Springer, London
-
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. Advances in Cryptology-EUROCRYPT 2001. Lecture Notes in Computer Science, vol. 2045, pp. 280-300. Springer, London (2001)
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
-
12
-
-
4244053632
-
Efficient protocols based on probabilistic encryption using composite degree residue classes
-
BRICS
-
Damgård, I.B., Jurik, M.J.: Efficient protocols based on probabilistic encryption using composite degree residue classes. Technical Report RS-00-5, BRICS (2000)
-
(2000)
Technical Report RS-00-5
-
-
Damgård, I.B.1
-
18
-
-
84864154588
-
-
The freenet project
-
The freenet project ( http://freenetproject.org )
-
-
-
-
20
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: Proceedings of the Symposium on Theory of Computation (STOC) (1998)
-
(1998)
Proceedings of the Symposium on Theory of Computation (STOC)
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
23
-
-
33645593031
-
The Foundations of Cryptography
-
chap. Cambridge University Press, London
-
Goldreich, O.: The Foundations of Cryptography, vol. 2. General Cryptographic Protocols, chap. Cambridge University Press, London (2004)
-
(2004)
General Cryptographic Protocols
, vol.2
-
-
Goldreich, O.1
-
26
-
-
0001511080
-
Gloss: Text source discovery over the internet
-
10.1145/320248.320252
-
L. Gravano H. Garcia-Molina A. Tomasic 1999 Gloss: Text source discovery over the internet ACM Trans. Database Syst. 24 2 229 264 10.1145/320248.320252
-
(1999)
ACM Trans. Database Syst.
, vol.24
, Issue.2
, pp. 229-264
-
-
Gravano, L.1
Garcia-Molina, H.2
Tomasic, A.3
-
27
-
-
0036361105
-
Executing sql over encrypted data in the database-service-provider model
-
Hacigumus, H., Iyer, B., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the Conference on Management of Data (SIGMOD) (2002)
-
(2002)
Proceedings of the Conference on Management of Data (SIGMOD)
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
29
-
-
0019608720
-
Formal models of computer security
-
10.1145/356850.356852
-
C. Landwehr 1981 Formal models of computer security ACM Comput. Surv. 13 3 247 278 10.1145/356850.356852
-
(1981)
ACM Comput. Surv.
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.1
-
31
-
-
84864156766
-
-
Napster file-sharing
-
Napster file-sharing ( http://www.napster.com )
-
-
-
-
33
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
10.1145/290163.290168
-
M.K. Reiter A.D. Rubin 1998 Crowds: Anonymity for Web transactions ACM Trans. Inform. Syst. Secur. 1 1 66 92 10.1145/290163.290168
-
(1998)
ACM Trans. Inform. Syst. Secur.
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
34
-
-
36048933310
-
Privacy-preserving distributed queries for a clinical case research network
-
Schadow, G., Grannis, S.J., McDonald, C.J.: Privacy-preserving distributed queries for a clinical case research network. In: Proceedings of the IEEE International Conference on Data Mining; Workshop on Privacy, Security, and Data Mining (2002)
-
(2002)
Proceedings of the IEEE International Conference on Data Mining; Workshop on Privacy, Security, and Data Mining
-
-
Schadow, G.1
Grannis, S.J.2
McDonald, C.J.3
-
36
-
-
84947772655
-
A new and efficient all or nothing disclosure of secrets protocol
-
Kazuo, O., Dingyi, P. (eds.) number 1514 in Lecture Notes in Computer Science
-
Stern, J.P.: A new and efficient all or nothing disclosure of secrets protocol. In: Kazuo, O., Dingyi, P. (eds.) Advances in Cryptology-ASIACRYPT'98, number 1514 in Lecture Notes in Computer Science (1998)
-
(1998)
Advances in Cryptology-ASIACRYPT'98
-
-
Stern, J.P.1
|