-
1
-
-
77955432909
-
-
Alexa the Web Information Company
-
Alexa the Web Information Company (2010), http://www.alexa.com/
-
(2010)
-
-
-
2
-
-
72849124827
-
Fighting coordinated attackers with crossorganizational information sharing
-
November
-
Allman, M., Blanton, E., Paxson, V., Shenker, S.: Fighting coordinated attackers with crossorganizational information sharing. In: HotNets (November 2006)
-
(2006)
HotNets
-
-
Allman, M.1
Blanton, E.2
Paxson, V.3
Shenker, S.4
-
3
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
October
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: A system for secure multi-party computation. In: CCS (October 2008)
-
(2008)
CCS
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
4
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: STOC (1988)
-
(1988)
STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
70350379222
-
Secure multiparty computation goes live
-
Dingledine, R., Golle, P. eds., Springer, Heidelberg
-
Bogetoft, P., Christensen, D. L., Damgard, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
6
-
-
85065181066
-
The Chubby lock service for loosely-coupled distributed systems
-
November
-
Burrows, M.: The Chubby lock service for loosely-coupled distributed systems. In: OSDI (November 2006)
-
(2006)
OSDI
-
-
Burrows, M.1
-
7
-
-
84937453032
-
Multiparty unconditionally secure protocols
-
Pomerance, C. ed., Springer, Heidelberg
-
Chaum, D., Crépeau, C., Damgård, I. B.: Multiparty unconditionally secure protocols. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 462-462. Springer, Heidelberg (1988)
-
(1988)
CRYPTO 1987. LNCS
, vol.293
, pp. 462-462
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.B.3
-
8
-
-
0032201622
-
Private information retrieval
-
November
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. J. ACM 45 (6) (November 1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
9
-
-
70350347974
-
On the amortized complexity of zero-knowledge protocols
-
Halevi, S. ed., Springer, Heidelberg
-
Cramer, R., Damgård, I.: On the amortized complexity of zero-knowledge protocols. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 177-191. Springer, Heidelberg (2009)
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 177-191
-
-
Cramer, R.1
Damgård, I.2
-
10
-
-
68949136946
-
Efficient robust private set intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. eds., Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
12
-
-
84947273682
-
The sybil attack
-
Druschel, P., Kaashoek, M. F., Rowstron, A. eds., Springer, Heidelberg
-
Douceur, J. R.: The Sybil attack. In: Druschel, P., Kaashoek, M. F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
-
(2002)
IPTPS 2002. LNCS
, vol.2429
, pp. 251
-
-
Douceur, J.R.1
-
13
-
-
0030150177
-
Comparing information without leaking it
-
Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Comm. ACM 39 (5) (1996)
-
(1996)
Comm. ACM
, vol.39
, Issue.5
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
14
-
-
77955450867
-
Fair exchange with a semi-trusted third party (extended abstract)
-
April
-
Franklin, M. K., Reiter, M. K.: Fair exchange with a semi-trusted third party (extended abstract). In: CCS (April 1997)
-
(1997)
CCS
-
-
Franklin, M.K.1
Reiter, M.K.2
-
15
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Kilian, J. ed., Springer, Heidelberg
-
Freedman, M. J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005)
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
16
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J. L. eds., Springer, Heidelberg
-
Freedman, M. J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J. L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
17
-
-
77955463508
-
-
Friend-of-a-Friend Project
-
Friend-of-a-Friend Project (2009), http://www.foaf-project.org/
-
(2009)
-
-
-
18
-
-
80054705061
-
Re: Reliable email
-
May
-
Garriss, S., Kaminsky, M., Freedman, M. J., Karp, B., Mazières, D., Yu, H.: Re: Reliable email. In: NSDI (May 2006)
-
(2006)
NSDI
-
-
Garriss, S.1
Kaminsky, M.2
Freedman, M.J.3
Karp, B.4
Mazières, D.5
Yu, H.6
-
20
-
-
0002337124
-
How to play any mental game (extended abstract)
-
May
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game (extended abstract). In: STOC (May 1987)
-
(1987)
STOC
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
23
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. ed., Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
24
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. ed., Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
CRYPTO 2003. LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
25
-
-
0036805563
-
DNS performance and the effectiveness of caching
-
October
-
Jung, J., Sit, E., Balakrishnan, H., Morris, R.: DNS performance and the effectiveness of caching. IEEE/ACM Trans. Networking 10 (5) (October 2002)
-
(2002)
IEEE/ACM Trans. Networking
, vol.10
, Issue.5
-
-
Jung, J.1
Sit, E.2
Balakrishnan, H.3
Morris, R.4
-
26
-
-
33745160750
-
Privacy preserving set operations
-
Shoup, V. ed., Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
27
-
-
84974555530
-
Privacy preserving data mining
-
Bellare, M. ed. Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 36. Springer, Heidelberg (2000)
-
(2000)
CRYPTO 2000. LNCS
, vol.1880
, pp. 36
-
-
Lindell, Y.1
Pinkas, B.2
-
28
-
-
85084163840
-
Fairplay: A secure two-party computation system
-
August
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay: A secure two-party computation system. In: USENIX Security (August 2004)
-
(2004)
USENIX Security
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
29
-
-
34248379606
-
Analyzing large DDoS attacks using multiple data sources
-
September
-
Mao, Z., Sekar, V., Spatscheck, O., van der Merwe, J., Vasudevan, R.: Analyzing large DDoS attacks using multiple data sources. In: SIGCOMM LSAD (September 2006)
-
(2006)
SIGCOMM LSAD
-
-
Mao, Z.1
Sekar, V.2
Spatscheck, O.3
Van Der Merwe, J.4
Vasudevan, R.5
-
30
-
-
0003147279
-
Oblivious transfer and polynomial evaluation
-
May
-
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC (May 1999)
-
(1999)
STOC
-
-
Naor, M.1
Pinkas, B.2
-
31
-
-
84957096920
-
Oblivious transfer with adaptive queries
-
Wiener, M. ed., Springer, Heidelberg
-
Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 573. Springer, Heidelberg (1999)
-
(1999)
CRYPTO 1999. LNCS
, vol.1666
, pp. 573
-
-
Naor, M.1
Pinkas, B.2
-
32
-
-
64049119146
-
Efficient oblivious transfer protocols
-
January
-
Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA (January 2001)
-
(2001)
SODA
-
-
Naor, M.1
Pinkas, B.2
-
33
-
-
0031332843
-
Number-theoretic constructions of efficient pseudorandom functions
-
October
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudorandom functions. In: FOCS (October 1997)
-
(1997)
FOCS
-
-
Naor, M.1
Reingold, O.2
-
34
-
-
36949017412
-
ConfiDNS: Leveraging scale and history to improve DNS security
-
November
-
Poole, L., Pai, V. S.: ConfiDNS: Leveraging scale and history to improve DNS security. In: WORLDS (November 2006)
-
(2006)
WORLDS
-
-
Poole, L.1
Pai, V.S.2
-
35
-
-
33845572567
-
-
Privacy Rights Clearinghouse. January
-
Privacy Rights Clearinghouse. A chronology of data breaches (January 2009), http://www.privacyrights.org/ar/ChronDataBreaches.htm
-
(2009)
A Chronology of Data Breaches
-
-
-
36
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
Harvard Aiken Computation Lab
-
Rabin, M.: How to exchange secrets by oblivious transfer. Tech. Rep. TR-81, Harvard Aiken Computation Lab. (1981)
-
(1981)
Tech. Rep. TR-81
-
-
Rabin, M.1
-
37
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours) : Why size estimates remain challenging
-
April
-
Rajab, M. A., Zarfoss, J., Monrose, F., Terzis, A.: My botnet is bigger than yours (maybe, better than yours) : Why size estimates remain challenging. In: HotBots (April 2007)
-
(2007)
HotBots
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
38
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
September
-
Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: SIGCOMM (September 2006)
-
(2006)
SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
40
-
-
39049090038
-
Inoculating SSH against address harvesting
-
Feburary
-
Schechter, S., Jung, J., Stockwell, W., McLain, C.: Inoculating SSH against address harvesting. In: NDSS (Feburary 2006)
-
(2006)
NDSS
-
-
Schechter, S.1
Jung, J.2
Stockwell, W.3
McLain, C.4
-
41
-
-
85034040740
-
Perspectives: Improving SSH-style host authentication with multi-path probing
-
June
-
Wendlandt, D., Andersen, D. G., Perrig, A.: Perspectives: Improving SSH-style host authentication with multi-path probing. In: USENIX Technical (June 2008)
-
(2008)
USENIX Technical
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
-
42
-
-
0020312165
-
Protocols for secure computations
-
November
-
Yao, A. C.: Protocols for secure computations. In: FOCS (November 1982)
-
(1982)
FOCS
-
-
Yao, A.C.1
|