-
5
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
P. A.Bonatti and P.Samarati.A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3):241–272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.A.1
Samarati, P.2
-
9
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R.Canetti.Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
10
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D.Chaum.Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, October1985.
-
(1985)
Communications of the ACM
, vol.28 October
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
12
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
D.Chaum and J.-H.Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Proceedings of Advances in cryptology— CRYPTO’86, pages 118–167, January 1987.
-
(1987)
Proceedings of Advances in cryptology— CRYPTO’86
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
13
-
-
25844481612
-
Optimizing cost-sensitive trust-negotiation protocols
-
W.Chen, L.Clarke, J.Kurose, and D.Towsley.Optimizing cost-sensitive trust-negotiation protocols. In Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), volume 2, pages1431–1442, 2005.
-
(2005)
Proceedings of the 24Th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM)
, vol.2
, pp. 1431-1442
-
-
Chen, W.1
Clarke, L.2
Kurose, J.3
Towsley, D.4
-
14
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
Springer, Dec
-
C.Cocks. An identity based encryption scheme based on quadratic residues. In 8th IMA International Conference on Cryptography and Coding, volume 2260, pages 360–363. Springer, Dec. 2001.
-
(2001)
8Th IMA International Conference on Cryptography and Coding
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
17
-
-
0038011186
-
Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E.Damiani, S.De Capitanidi Vimercati, S.Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In ACM Conference on Computer and Communications Security (CCS’02), pages 207–216, 2002.
-
(2002)
ACM Conference on Computer and Communications Security (CCS’02
, pp. 207-216
-
-
Damiani, E.S.1
De Capitanidi Vimercati Paraboschi, S.P.2
-
19
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer-Verlag, May
-
M.Freedman, K.Nissim, and B.Pinkas. Efficient private matching and set intersection. In Advances in Cryptology – Eurocrypt’04, volume 3027 of LNCS, pages 1–19. Springer-Verlag, May2004.
-
(2004)
Advances in Cryptology – Eurocrypt’04, Volume 3027 of LNCS
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
22
-
-
38349082709
-
Trust negotiation with hidden credentials, hidden policies, and policy cycles
-
K. B.Frikken, J.Li, and M. J.Atallah. Trust negotiation with hidden credentials, hidden policies, and policy cycles. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS), 2006.
-
(2006)
Proceedings of the 13Th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Frikken, K.B.1
Li, J.2
Atallah, M.J.3
-
33
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
H.Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Advances in Cryptology — Asiacrypt’03, LNCS, pages 416–433, 2003.
-
(2003)
Advances in Cryptology — Asiacrypt’03, LNCS
, pp. 416-433
-
-
Lipmaa, H.1
-
34
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P.Paillier. Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology – EUROCRYPT 1999, LNCS1592:223–238, 1999.
-
(1999)
Advances in Cryptology – EUROCRYPT 1999, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
38
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, Jan
-
W. H.Winsborough, K. E.Seamons, and V. E.Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88–102. IEEE Press, Jan. 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
39
-
-
21644436056
-
Meeting central: Making distributed meetings more effective
-
New York, NY, USA, ACM Press
-
N.Yankelovich, W.Walker, P.Roberts, M.Wessler, J.Kaplan, and J.Provino. Meeting central: making distributed meetings more effective. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW’04), pages 419–428, New York, NY, USA, 2004. ACM Press.
-
(2004)
Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW’04
, pp. 419-428
-
-
Yankelovich, N.1
Walker, W.2
Roberts, P.3
Wessler, M.4
Kaplan, J.5
Provino, J.6
-
41
-
-
85025647313
-
-
November, Technical Report. Brown University
-
D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Flexible, secure and private point-based trust management, November2005. Technical Report. Brown University.
-
(2005)
Flexible, Secure and Private Point-Based Trust Management
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
Tamassia, R.4
-
42
-
-
85025690907
-
Privacy-preserving computation of trust with application to fuzzy location queries, March 2006
-
D.Yao, R.Tamassia, and S.Proctor. Privacy-preserving computation of trust with application to fuzzy location queries, March 2006. Brown University Technical Report.
-
Brown University Technical Report.
-
-
Yao, D.1
Tamassia, R.2
Proctor, S.3
-
44
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society Press, May
-
T.Yu and M.Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110–122. IEEE Computer Society Press, May2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
46
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
V. Atluri, P. Ning, and W. Du, editors, ACM
-
C.Zouridaki, B. L.Mark, M.Hejmo, and R. K.Thomas. A quantitative trust establishment framework for reliable data packet delivery in MANETs. In V. Atluri, P. Ning, and W. Du, editors, Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pages 1–10. ACM, 2005.
-
(2005)
Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
|