메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Analysis-Resistant Malware

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION RETRIEVAL; NETWORK SECURITY; PRIVACY-PRESERVING TECHNIQUES;

EID: 77956179539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (30)
  • 1
    • 0038837376 scopus 로고    scopus 로고
    • Oxford University Computing Services. Information
    • The British national corpus. Oxford University Computing Services. Information available at http://www.natcorp.ox.ac.uk/.
    • The British national corpus
  • 5
    • 33751062464 scopus 로고    scopus 로고
    • New techniques for private stream searching
    • Extended abstract appeared in the IEEE Symposium on Security and Privacy, full version
    • J. Bethencourt, D. Song, and B. Waters. New techniques for private stream searching. 2006. Extended abstract appeared in the IEEE Symposium on Security and Privacy, full version available at http://www.cs.cmu.edu/~bethenco/ search.ps.
    • (2006)
    • Bethencourt, J.1    Song, D.2    Waters, B.3
  • 7
    • 14844331039 scopus 로고    scopus 로고
    • Web tap: Detecting covert web traffic
    • Atluri, B. Pfitzmann, and P. D. McDaniel, ed. ACM, Washington, D.C. October
    • K. Borders and A. Prakash. Web tap: Detecting covert web traffic. ACM Conference on Computer and Communications Security, V. Atluri, B. Pfitzmann, and P. D. McDaniel, ed. ACM, Washington, D.C. October 2004.
    • (2004) ACM Conference on Computer and Communications Security
    • Borders, K.1    Prakash, A.2
  • 9
    • 0001090406 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. Eurocrypt, 1999.
    • (1999) Eurocrypt
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 13
    • 0000534667 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • August
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. International Cryptology Conference (CRYPTO), August 1984.
    • (1984) International Cryptology Conference (CRYPTO)
    • ElGamal, T.1
  • 14
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Pittsburgh, Pennsylvania, October
    • S. Goldwasser and Y. T. Kalai. On the impossibility of obfuscation with auxiliary input. Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, October 2005.
    • (2005) Symposium on Foundations of Computer Science
    • Goldwasser, S.1    Kalai, Y. T.2
  • 16
    • 0003004996 scopus 로고    scopus 로고
    • Efficient receipt-free voting based on homomorphic encryption
    • M. Hirt and K. Sako. Efficient receipt-free voting based on homomorphic encryption. Eurocrypt, 2000.
    • (2000) Eurocrypt
    • Hirt, M.1    Sako, K.2
  • 19
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Miami Beach, Florida, October
    • E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. Symposium on Foundations of Computer Science, Miami Beach, Florida, October 1997.
    • (1997) Symposium on Foundations of Computer Science
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 20
    • 85180739984 scopus 로고    scopus 로고
    • Data exfiltration techniques: How attackers steal your sensitive data
    • October
    • R. Murawski. Data exfiltration techniques: How attackers steal your sensitive data. Virus Bulletin Conference, October 2006.
    • (2006) Virus Bulletin Conference
    • Murawski, R.1
  • 23
    • 85180808957 scopus 로고    scopus 로고
    • III. A survey of single database PIR: Techniques and applications
    • Cryptology ePrint Archive, Report 2007/059
    • R. Ostrovsky and W. E. Skeith, III. A survey of single database PIR: Techniques and applications. Cryptology ePrint Archive, Report 2007/059, 2007. http://eprint.iacr.org/.
    • (2007)
    • Ostrovsky, R.1    Skeith, W. E.2
  • 24
    • 85180755688 scopus 로고    scopus 로고
    • III. Algebraic lower bounds for computing on encrypted data
    • Cryptology ePrint Archive, Report 2007/064
    • R. Ostrovsky and W. E. Skeith, III. Algebraic lower bounds for computing on encrypted data. Cryptology ePrint Archive, Report 2007/064, 2007. http://eprint.iacr.org/.
    • (2007)
    • Ostrovsky, R.1    Skeith, W. E.2
  • 25
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. Eurocrypt, 1999.
    • (1999) Eurocrypt
    • Paillier, P.1
  • 27
    • 85180801067 scopus 로고    scopus 로고
    • Top-tier Israeli firms suspected of spying on competition
    • English Edition, May
    • R. Singer. Top-tier Israeli firms suspected of spying on competition. Haaretz Daily News, English Edition, May 2005.
    • (2005) Haaretz Daily News
    • Singer, R.1
  • 29
    • 85180764165 scopus 로고    scopus 로고
    • Israel espionage case points to new net threat
    • June
    • B. Sullivan. Israel espionage case points to new net threat. MSNBC News, See http://www.msnbc.msn. com/id/8145520/, June 2005.
    • (2005) MSNBC News
    • Sullivan, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.