-
1
-
-
0041783510
-
Privacy-Preserving Data Mining
-
Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, Dallas, TX, USA, May 2000, pp. 439-450 (2000)
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, Dallas, TX, USA, May 2000
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
84921020129
-
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
-
Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWORC 2007. Springer, Heidelberg
-
Aguilar-Melchor, C., Gaborit, P.: A Lattice-Based Computationally- Efficient Private Information Retrieval Protocol. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWORC 2007. LNCS, vol. 4945, pp. 50-54. Springer, Heidelberg (2008), http://eprint.iacr.org/2007/446
-
(2008)
LNCS
, vol.4945
, pp. 50-54
-
-
Aguilar-Melchor, C.1
Gaborit, P.2
-
3
-
-
84974593790
-
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
-
Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
-
Beimel, A., Ishai, Y., Malkin, T.: Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 55-73. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 55-73
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
4
-
-
0001855734
-
On the Size of Binary Decision Diagrams Representing Boolean Functions
-
Breitbart, Y., Hunt III, H.B., Rosenkrantz, D.J.: On The Size of Binary Decision Diagrams Representing Boolean Functions. Theoretical Computer Science 145(1&2), 45-69 (1995)
-
(1995)
Theoretical Computer Science
, vol.145
, Issue.1-2
, pp. 45-69
-
-
Breitbart, Y.1
Hunt III, H.B.2
Rosenkrantz, D.J.3
-
5
-
-
0034782679
-
Selective Private Function Evaluation with Applications to Private Statistics
-
ACM Press, Newport
-
Canetti, R., Ishai, Y., Kumar, R., Reiter, M.K., Rubinfeld, R., Wright, R.N.: Selective Private Function Evaluation with Applications to Private Statistics. In: PODC 2001, Rhode Island, USA, August 26-29, pp. 293-304. ACM Press, Newport (2001)
-
(2001)
PODC 2001, Rhode Island, USA, August 26-29
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
6
-
-
85141026002
-
On the Computational Practicality of Private Information Retrieval
-
Carbunar, B., Sion, R.: On the Computational Practicality of Private Information Retrieval. In: NDSS 2007, San Diego, California, USA, February 27-March 2 (2007)
-
(2007)
NDSS 2007, San Diego, California, USA, February 27-March 2
-
-
Carbunar, B.1
Sion, R.2
-
7
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Kim, K.-c. (ed.) PKC 2001. Springer, Heidelberg
-
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
8
-
-
63449103075
-
A Length-Flexible Threshold Cryptosystem with Applications
-
Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. Springer, Heidelberg
-
Damgård, I., Jurik, M.: A Length-Flexible Threshold Cryptosystem with Applications. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol. 2727, pp. 350-364. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2727
, pp. 350-364
-
-
Damgård, I.1
Jurik, M.2
-
9
-
-
0031120522
-
Multi-Terminal Binary Decision Diagrams: An Efficient Data Structure for Matrix Representation
-
Fujita, M., McGeer, P.C., Yang, J.C.Y.: Multi-Terminal Binary Decision Diagrams: An Efficient Data Structure for Matrix Representation. Formal Methods in System Design 10(2/3), 149-169 (1997) (Pubitemid 127506985)
-
(1997)
Formal Methods in System Design
, vol.10
, Issue.2-3
, pp. 149-169
-
-
Fujita, M.1
Mcgeer, P.C.2
Yang, J.C.-Y.3
-
11
-
-
70350642087
-
Fully Homomorphic Encryption Using Ideal Lattices
-
Mitzenmacher, M. (ed.) ACM Press, Bethesda
-
Gentry, C.: Fully Homomorphic Encryption Using Ideal Lattices. In: Mitzenmacher, M. (ed.) STOC 2009, May 31-Jun 2, 2009, pp. 169-178. ACM Press, Bethesda (2009)
-
(2009)
STOC 2009, May 31-Jun 2, 2009
, pp. 169-178
-
-
Gentry, C.1
-
12
-
-
26444512068
-
Single-Database Private Information Retrieval with Constant Communication Rate
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. Springer, Heidelberg
-
Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
14
-
-
38049046515
-
Evaluating Branching Programs on Encrypted Data
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 575-594
-
-
Ishai, Y.1
Paskin, A.2
-
15
-
-
0031378815
-
Replication is Not Needed: Single Database, Computationally-Private Information Retrieval
-
IEEE Computer Society, Los Alamitos
-
Kushilevitz, E., Ostrovsky, R.: Replication is Not Needed: Single Database, Computationally-Private Information Retrieval. In: FOCS 1997, October 20-22, pp. 364-373. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
FOCS 1997, October 20-22
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
16
-
-
38049016843
-
A New Protocol for Conditional Disclosure of Secrets and Its Applications
-
Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
-
Laur, S., Lipmaa, H.: A New Protocol for Conditional Disclosure of Secrets And Its Applications. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 207-225. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 207-225
-
-
Laur, S.1
Lipmaa, H.2
-
17
-
-
0026882239
-
On the OBDD-Representation of General Boolean Functions
-
Liaw, H.T., Lin, C.S.: On the OBDD-Representation of General Boolean Functions. IEEE Transactions on Computers 41(6), 661-664 (1992)
-
(1992)
IEEE Transactions on Computers
, vol.41
, Issue.6
, pp. 661-664
-
-
Liaw, H.T.1
Lin, C.S.2
-
18
-
-
33645970169
-
An Oblivious Transfer Protocol with Log-Squared Communication
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
-
Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
19
-
-
56649091142
-
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Lipmaa, H.: New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 441-454. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 441-454
-
-
Lipmaa, H.1
-
21
-
-
0032669864
-
Oblivious Transfer and Polynomial Evaluation
-
ACM Press, Atlanta
-
Naor, M., Pinkas, B.: Oblivious Transfer And Polynomial Evaluation. In: STOC 1999, May 1-4, 1999, pp. 245-254. ACM Press, Atlanta (1999)
-
(1999)
STOC 1999, May 1-4, 1999
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
22
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
84947772655
-
A New and Efficient All or Nothing Disclosure of Secrets Protocol
-
Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. Springer, Heidelberg
-
Stern, J.P.: A New And Efficient All Or Nothing Disclosure of Secrets Protocol. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 357-371. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1514
, pp. 357-371
-
-
Stern, J.P.1
-
24
-
-
0003197321
-
Branching Programs and Binary Decision Diagrams: Theory and Applications
-
Society for Industrial Mathematics
-
Wegener, I.: Branching Programs and Binary Decision Diagrams: Theory and Applications. Monographs on Discrete Mathematics and Applications, Society for Industrial Mathematics (2000)
-
(2000)
Monographs on Discrete Mathematics and Applications
-
-
Wegener, I.1
|