-
1
-
-
78650157309
-
-
Applebaum, B., Freedman, M., Ringberg, H., Caesar, M., Rexford J.: Collaborative, Privacy-Preserving Data Aggregation At Scale (2009), http://eprint.iacr.org/2009/180.pdf
-
(2009)
Collaborative, Privacy-Preserving Data Aggregation at Scale
-
-
Applebaum, B.1
Freedman, M.2
Ringberg, H.3
Caesar, M.4
Rexford, J.5
-
2
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceesings of the 15th ACM Conference on Computer and Communications Security, CCS (2008)
-
Proceesings of the 15th ACM Conference on Computer and Communications Security, CCS (2008)
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
4
-
-
78650131106
-
-
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Security through Private Information Aggregation (2009), http://arxiv1.library.cornell. edu/abs/0903.4258
-
(2009)
SEPIA: Security Through Private Information Aggregation
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
7
-
-
38249007777
-
Birthday paradox, coupon collectors, caching algorithms and self-organizing search
-
Flajolet, P., Gardy, D., Thimonier, L.: Birthday paradox, coupon collectors, caching algorithms and self-organizing search. Discrete Applied Mathematics 39(3) (1992)
-
(1992)
Discrete Applied Mathematics
, vol.39
, Issue.3
-
-
Flajolet, P.1
Gardy, D.2
Thimonier, L.3
-
10
-
-
78650161040
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Proceedings of the 5th Theory of Cryptography Conference (2008)
-
Proceedings of the 5th Theory of Cryptography Conference (2008)
-
-
Hazay, C.1
Lindell, Y.2
-
12
-
-
72949089461
-
On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols
-
Kerschbaum, F., Dahlmeier, D., Schröpfer, A., Biswas, D.: On the Practical Importance of Communication Complexity for Secure Multi-Party Computation Protocols. In: Proceedings of the 24th ACM Symposium on Applied Computing (2009)
-
Proceedings of the 24th ACM Symposium on Applied Computing (2009)
-
-
Kerschbaum, F.1
Dahlmeier, D.2
Schröpfer, A.3
Biswas, D.4
-
17
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
Locasto, M., Parekh, J., Keromytis, A., Stolfo, S.: Towards Collaborative Security and P2P Intrusion Detection. In: Proceedings of the Information Assurance Workshop (2005)
-
Proceedings of the Information Assurance Workshop (2005)
-
-
Locasto, M.1
Parekh, J.2
Keromytis, A.3
Stolfo, S.4
-
22
-
-
53349116472
-
RFID in the Supply Chain: Panacea or Pandora's Box?
-
Santos, B., Smith, L.: RFID in the Supply Chain: Panacea or Pandora's Box? Communications of the ACM 51(10) (2008)
-
(2008)
Communications of the ACM
, vol.51
, Issue.10
-
-
Santos, B.1
Smith, L.2
-
23
-
-
0035517988
-
Radio frequency identification and the electronic product code
-
Sarma, S., Brock, D., Engels, D.: Radio frequency identification and the electronic product code. IEEE Micro. 21(6) (2001)
-
(2001)
IEEE Micro.
, vol.21
, Issue.6
-
-
Sarma, S.1
Brock, D.2
Engels, D.3
|