-
1
-
-
0023408117
-
Processing encrypted data
-
doi:10.1145/30401.30404
-
Ahituv N., Lapid Y., Neumann S.: Processing encrypted data. Comm. ACM 20(9), 777-780 (1987). doi: 10. 1145/30401. 30404.
-
(1987)
Comm. ACM
, vol.20
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
3
-
-
33750314850
-
-
Bernstein, Y., Shokouhi, M., Zobel, J.: Compact features for detection of near-duplicates in distributed retrieval. In: SPIRE, Glasgow, UK, pp. 110-121, Oct 11-13, 2006.
-
-
-
-
4
-
-
85198677809
-
-
Brin, S., Davis, J., Garcia-Molina, H.: Copy detection mechanisms for digital documents. In: Proceedings of the 1995 ACM SIGMOD Conference on Management of Data, pp. 398-409. ACM, San Jose (1995).
-
-
-
-
5
-
-
0031346696
-
-
Broder, A. Z.: On the resemblance and containment of documents. In: Compression and Complexity of Sequences, pp. 21-29 (1997).
-
-
-
-
6
-
-
0032201622
-
Private information retrieval
-
doi:10.1145/293347.293350
-
Chor B., Kushilevitz E., Goldreich O., Sudan M.: Private information retrieval. JACM 45(6), 965-981 (1998). doi: 10. 1145/293347. 293350.
-
(1998)
Jacm
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
16444372473
-
SPlaT: A system for self-plagiarism detection
-
Algarve, Portugal, Nov 5-8
-
Collberg, C., Kobourov, S., Louie, J., Slattery, T.: SPlaT: a system for self-plagiarism detection. In: Proceedings of IADIS International Conference WWW/INTERNET 2003, Algarve, Portugal, pp. 508-514, Nov 5-8, 2003.
-
(2003)
Proceedings of IADIS International Conference WWW/INTERNET 2003
, pp. 508-514
-
-
Collberg, C.1
Kobourov, S.2
Louie, J.3
Slattery, T.4
-
9
-
-
77955176442
-
A document comparison scheme for secure duplicate detection
-
Federica M., Riccardo M., Paolo T.: A document comparison scheme for secure duplicate detection. Int. J. Digit. Libr. 4(3), 223-244 (2004).
-
(2004)
Int. J. Digit. Libr.
, vol.4
, Issue.3
, pp. 223-244
-
-
Federica, M.1
Riccardo, M.2
Paolo, T.3
-
12
-
-
77955172524
-
-
Goethals, B., Laur, S., Lipmaa, H., Mielikainen, T.: On secure scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), Seoul, Korea, pp. 104-120, Dec 2-3, 2004.
-
-
-
-
13
-
-
33645593031
-
The Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: The Foundations of Cryptography. In: General Cryptographic Protocols, vol. 2. Cambridge University Press, Cambridge. http://www. wisdom. weizmann. ac. il/oded/PSBookFrag/prot. ps (2004).
-
(2004)
General Cryptographic Protocols
, vol.2
-
-
Goldreich, O.1
-
14
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on Theory of Computing, New York, NY, USA, pp. 218-229 (1987).
-
-
-
-
16
-
-
0021941417
-
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. In: Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC'85), Providence, Rhode Island, USA, pp. 291-304, May 6-8, 1985.
-
-
-
-
17
-
-
0036361105
-
-
Hacigumus, H., Iyer, B. R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, pp. 216-227, June 4-6, 2002. doi: 10. 1145/564691. 564717.
-
-
-
-
18
-
-
84873534197
-
-
Hersh, W., Cohen, A. M., Roberts, P., Rekapalli, H. K.: TREC 2006 genomics track overview. In: TREC Notebook, NIST (2006).
-
-
-
-
19
-
-
84864164261
-
-
Lemur toolkit for language modeling and information retrieval
-
Lemur toolkit for language modeling and information retrieval: http://www. lemurproject. org/.
-
-
-
-
20
-
-
4243443776
-
-
Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33
-
Manber, U.: Finding similar files in a large file system. Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33. ftp://ftp. cs. arizona. edu/reports/1993/TR93-33. pdf (1993).
-
(1993)
Finding similar files in a large file system
-
-
Manber, U.1
-
21
-
-
84942550998
-
-
Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings. Lecture Notes in Computer Science, vol. 1592, pp. 223-238, Prague, Czech Republic, May 2-6, 1999.
-
-
-
-
22
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig S. C., Hellman M. E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory IT 24, 106-110 (1978).
-
(1978)
IEEE Trans. Inform. Theory IT
, vol.24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
23
-
-
1142267351
-
-
Schleimer, S., Wilkerson, D. S., Aiken, A.: Winnowing: Local algorithms for document fingerprinting. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 76-85, June 9-12, 2003. ACM, San Diego (2003).
-
-
-
-
24
-
-
77955176371
-
-
Shivakumar, N., Garcia-Molina, H.: SCAM: a copy detection mechanism for digital documents. In: Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95), Austin, Texas, USA, June 11-13, 1995.
-
-
-
-
25
-
-
0029696087
-
-
Shivakumar, N., Garcia-Molina, H.: Building a scalable and accurate copy detection mechanism. In: Proceedings of the First ACM International Conference on Digital libraries, Bethesda, MD, USA, pp. 160-168, Mar 20-23, 1996.
-
-
-
-
26
-
-
84892758238
-
-
Si, A., Leong, H. V., Lau, R.: CHECK: a document plagiarism detection system. In: Proceedings of ACM Symposium for Applied Computing, pp. 70-77. ACM, San Jose (1997).
-
-
-
-
27
-
-
79959990623
-
-
Sorokina, D., Gehrke, J., Warner, S., Ginsparg, P.: Plagiarism detection in arXiv. In: Sixth IEEE International Conference on Data Mining (ICDM06), Hong Kong, China, pp. 1070-1075, Dec 18-12, 2006.
-
-
-
-
28
-
-
0242709355
-
-
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp. 639-644, July 23-26, 2002. doi: 10. 1145/775047. 775142.
-
-
-
-
29
-
-
33750311279
-
-
Yang, H., Callan, J.: Near-duplicate detection by instance-level constrained clustering. In: Proceedings of the 29rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, WA, USA, pp. 421-428, Aug 6-11, 2006.
-
-
-
-
30
-
-
0022882770
-
-
Yao, A. C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167. IEEE, New York (1986).
-
-
-
|