-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Springer-Verlag
-
B. Aiello, Y. Ishai and O. Reingold, "Priced oblivious transfer: How to sell digital goods", Advances in Cryptology: Proceedings of Eurocrypt 01, pages 119-135, Springer-Verlag, 2001.
-
(2001)
Advances in Cryptology: Proceedings of Eurocrypt 01
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
4
-
-
0001870201
-
Locally random reductions: Improvements and applications
-
D. Beaver, J. Feigenbaum, J. Kilian and P. Rogaway, "Locally random reductions: Improvements and applications", Journal of Cryptology 10(1):17-36, 1997.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 17-36
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
5
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Springer-Verlag
-
F. Boudot, "Efficient proofs that a committed number lies in an interval", Advances in Cryptology: Proceedings of Eurocrypt 00, pages 431-444, Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology: Proceedings of Eurocrypt 00
, pp. 431-444
-
-
Boudot, F.1
-
6
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
Springer-Verlag
-
G. Brassard, C. Crépeau and J.-M. Robert, "All-or-nothing disclosure of secrets", Advances in Cryptology: Proceedings of Crypto 86, pages 234-238, Springer-Verlag, 1987.
-
(1987)
Advances in Cryptology: Proceedings of Crypto 86
, pp. 234-238
-
-
Brassard, G.1
Crépeau, C.2
Robert, J.-M.3
-
7
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
Springer-Verlag
-
C. Cachin, S. Micali and M. Stadler, "Computationally private information retrieval with polylogarithmic communication", Advances in Cryptology: Proceedings of Eurocrypt 99, pages 402-414, Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology: Proceedings of Eurocrypt 99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM 24(2):84-90, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
10
-
-
0022145479
-
Security without identification: Transaction systems to make Big Brother obsolete
-
October
-
D. Chaum, "Security without identification: Transaction systems to make Big Brother obsolete", Communications of the ACM 28(10):1030-1044, October 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
12
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz and M. Sudan, "Private information retrieval", Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science, pages 41-51, 1995.
-
(1995)
Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
13
-
-
35048876464
-
-
accessed 8 September 2004
-
R. Clarke, Fundamentals of negotiation. URL: www.anu.edu.au/people/Roger. Clarke/SOS/FundasNeg.html, 1993, accessed 8 September 2004.
-
(1993)
Fundamentals of Negotiation
-
-
Clarke, R.1
-
14
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
Springer-Verlag
-
C. Crépeau, "Equivalence between two flavours of oblivious transfers", Advances in Cryptology: Proceedings of Crypto 87, pages 350-354, Springer-Verlag, 1988.
-
(1988)
Advances in Cryptology: Proceedings of Crypto 87
, pp. 350-354
-
-
Crépeau, C.1
-
16
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory 31:469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
18
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz and T. Malkin, "Protecting data privacy in private information retrieval schemes", Proceedings of 30th Annual ACM Symposium on the Theory of Computing, pages 151-160, 1998.
-
(1998)
Proceedings of 30th Annual ACM Symposium on the Theory of Computing
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
19
-
-
57349166235
-
-
accessed 8 September 2004
-
Guardster, Ltd., "Anonymous web surfing", URL: www.guardster.com, accessed 8 September 2004.
-
Anonymous Web Surfing
-
-
-
20
-
-
0032093057
-
Agent-mediated electronic commerce: A survey
-
June
-
R. H. Guttman, A. G. Moukas and P. Maes, "Agent-mediated electronic commerce: A survey", Knowledge Engineering Review Journal 13(3):985-1003, June 1998.
-
(1998)
Knowledge Engineering Review Journal
, vol.13
, Issue.3
, pp. 985-1003
-
-
Guttman, R.H.1
Moukas, A.G.2
Maes, P.3
-
26
-
-
0032621240
-
The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms
-
U. M. Maurer and S. Wolf, "The relationship between breaking the Diffie-Hellman protocol and computing discrete logarithms", SIAM Journal of Computing 28(5):1689-1721, 1999.
-
(1999)
SIAM Journal of Computing
, vol.28
, Issue.5
, pp. 1689-1721
-
-
Maurer, U.M.1
Wolf, S.2
-
27
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle, "Secure communications over insecure channels", Communications of the ACM 21:294-299, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
31
-
-
0003578535
-
-
Office of the High Commissioner for Human Rights, accessed 8 September 2004
-
Office of the High Commissioner for Human Rights, "Universal Declaration of Human Rights", URL: http://www.unhchr.ch/udhr/lang/eng.htm, accessed 8 September 2004.
-
Universal Declaration of Human Rights
-
-
-
33
-
-
0003462641
-
-
Technical memo TR-81, Aiken Computation Laboratory, Harvard University
-
M. Rabin, "How to exchange secrets by oblivious transfer", Technical memo TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.1
-
35
-
-
0034809926
-
Practical server privacy with secure coprocessors
-
September
-
S. W. Smith and D. Safford, "Practical server privacy with secure coprocessors", IBM Systems Journal 40(3):683-695, September 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 683-695
-
-
Smith, S.W.1
Safford, D.2
-
38
-
-
85039254031
-
-
Network-Tools.com, accessed 8 September 2004
-
Network-Tools.com, Tools to trace a user, URL: www.Network-Tools.com, accessed 8 September 2004.
-
Tools to Trace a User
-
-
-
39
-
-
0003725488
-
-
Prentice Hall
-
E. Turban, E. Mclean, J. Wetherbe, N. Bolloju and R. Davison, Electronic Commerce, A Managerial Perspective, Prentice Hall, 2002.
-
(2002)
Electronic Commerce, A Managerial Perspective
-
-
Turban, E.1
Mclean, E.2
Wetherbe, J.3
Bolloju, N.4
Davison, R.5
-
40
-
-
35248831179
-
Captcha: Telling humans and computers apart
-
Springer-Verlag
-
L. von Ahn, M. Blum, N. J. Hopper and J. Langford, "Captcha: Telling humans and computers apart", Advances in Cryptology: Proceedings of Eurocrypt 03, pages 294-311, Springer-Verlag, 2003.
-
(2003)
Advances in Cryptology: Proceedings of Eurocrypt 03
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
41
-
-
0001998264
-
Conjugate coding
-
Manuscript written circa 1970; Unpublished until it appeared
-
S. Wiesner, "Conjugate coding", Manuscript written circa 1970; Unpublished until it appeared in Sigact News 15(1):78-88, 1983.
-
(1983)
Sigact News
, vol.15
, Issue.1
, pp. 78-88
-
-
Wiesner, S.1
|