-
1
-
-
0038837376
-
-
Oxford University Computing Services. Information
-
The British national corpus. Oxford University Computing Services. Information available at http://www.natcorp.ox.ac.uk/.
-
The British national corpus
-
-
-
2
-
-
0011188089
-
On the (Im)possibility of obfuscating programs
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (Im)possibility of obfuscating programs. International Cryptology Conference (CRYPTO), 2001.
-
(2001)
International Cryptology Conference (CRYPTO)
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
5
-
-
33751062464
-
New techniques for private stream searching
-
Extended abstract appeared in the IEEE Symposium on Security and Privacy, full version
-
J. Bethencourt, D. Song, and B. Waters. New techniques for private stream searching. 2006. Extended abstract appeared in the IEEE Symposium on Security and Privacy, full version available at http://www.cs.cmu.edu/~bethenco/ search.ps.
-
(2006)
-
-
Bethencourt, J.1
Song, D.2
Waters, B.3
-
7
-
-
14844331039
-
Web tap: Detecting covert web traffic
-
Atluri, B. Pfitzmann, and P. D. McDaniel, ed. ACM, Washington, D.C. October
-
K. Borders and A. Prakash. Web tap: Detecting covert web traffic. ACM Conference on Computer and Communications Security, V. Atluri, B. Pfitzmann, and P. D. McDaniel, ed. ACM, Washington, D.C. October 2004.
-
(2004)
ACM Conference on Computer and Communications Security
-
-
Borders, K.1
Prakash, A.2
-
9
-
-
0001090406
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Eurocrypt, 1999.
-
(1999)
Eurocrypt
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
10
-
-
0003701129
-
-
Department of Computer Science, Technion, Technical Report CS0917
-
B. Chor, N. Gilboa, and M. Naor. Private information retrieval by keywords. Department of Computer Science, Technion, Technical Report CS0917, 1998.
-
(1998)
Private information retrieval by keywords
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
11
-
-
0004046658
-
-
Department of Computer Sciences, The University of Auckland, Technical Report 148, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Department of Computer Sciences, The University of Auckland, Technical Report 148, July 1997.
-
(1997)
A taxonomy of obfuscating transformations
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
13
-
-
0000534667
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
August
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. International Cryptology Conference (CRYPTO), August 1984.
-
(1984)
International Cryptology Conference (CRYPTO)
-
-
ElGamal, T.1
-
16
-
-
0003004996
-
Efficient receipt-free voting based on homomorphic encryption
-
M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. Eurocrypt, 2000.
-
(2000)
Eurocrypt
-
-
Hirt, M.1
Sako, K.2
-
19
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Miami Beach, Florida, October
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. Symposium on Foundations of Computer Science, Miami Beach, Florida, October 1997.
-
(1997)
Symposium on Foundations of Computer Science
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
20
-
-
85180739984
-
Data exfiltration techniques: How attackers steal your sensitive data
-
October
-
R. Murawski. Data exfiltration techniques: How attackers steal your sensitive data. Virus Bulletin Conference, October 2006.
-
(2006)
Virus Bulletin Conference
-
-
Murawski, R.1
-
23
-
-
85180808957
-
III. A survey of single database PIR: Techniques and applications
-
Cryptology ePrint Archive, Report 2007/059
-
R. Ostrovsky and W. E. Skeith, III. A survey of single database PIR: Techniques and applications. Cryptology ePrint Archive, Report 2007/059, 2007. http://eprint.iacr.org/.
-
(2007)
-
-
Ostrovsky, R.1
Skeith, W. E.2
-
24
-
-
85180755688
-
III. Algebraic lower bounds for computing on encrypted data
-
Cryptology ePrint Archive, Report 2007/064
-
R. Ostrovsky and W. E. Skeith, III. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064, 2007. http://eprint.iacr.org/.
-
(2007)
-
-
Ostrovsky, R.1
Skeith, W. E.2
-
25
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt, 1999.
-
(1999)
Eurocrypt
-
-
Paillier, P.1
-
27
-
-
85180801067
-
Top-tier Israeli firms suspected of spying on competition
-
English Edition, May
-
R. Singer. Top-tier Israeli firms suspected of spying on competition. Haaretz Daily News, English Edition, May 2005.
-
(2005)
Haaretz Daily News
-
-
Singer, R.1
-
29
-
-
85180764165
-
Israel espionage case points to new net threat
-
June
-
B. Sullivan. Israel espionage case points to new net threat. MSNBC News, See http://www.msnbc.msn. com/id/8145520/, June 2005.
-
(2005)
MSNBC News
-
-
Sullivan, B.1
|