-
2
-
-
0022882770
-
How to Generate and Exchange Secrets
-
A.C. Yao, "How to Generate and Exchange Secrets," Proc. of Twenty-seventh IEEE Symposium on Foundations of Computer Science, Toronto, Canada, October 1986, 162-167.
-
Proc. of Twenty-seventh IEEE Symposium on Foundations of Computer Science, Toronto, Canada, October 1986
, pp. 162-167
-
-
Yao, A.C.1
-
3
-
-
78049392713
-
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures
-
Costin Raiciu and David S. Rosenblum, "Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures," Second International Conference on Security and Privacy in Communication Networks (SecureComm 2006), Baltimore, MD, USA, Aug 28-Sep 1, 2006
-
Second International Conference on Security and Privacy in Communication Networks (SecureComm 2006), Baltimore, MD, USA, Aug 28-Sep 1, 2006
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
4
-
-
0027986369
-
A Minimal Model for Secure Computation
-
Uri Feige, Joe Kilian, and Moni Naor, "A Minimal Model for Secure Computation," Proceedings of the Twenty-Sixth Annual ACM Symposium on theory of Computing (STOC '94), Montreal, Quebec, Canada, May 23-25, 1994
-
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (STOC '94), Montreal, Quebec, Canada, May 23-25, 1994
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
5
-
-
0033309271
-
Non-Interactive CryptoComputing for NC1
-
Tomas Sander, Adam Young, and Moti Yung, "Non-Interactive CryptoComputing For NC1," Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS '99), Washington, DC, USA, Oct 17-18, 1999
-
Proceedings of the 40th Annual Symposium on Foundations of Computer Science (FOCS '99), Washington, DC, USA, Oct 17-18, 1999
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
6
-
-
1842704832
-
Forwarding in a Content-Based Network
-
Antonio Carzaniga and Alexander L. Wolf, "Forwarding in a Content-Based Network," Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols For Computer Communications (SIGCOMM '03), Karlsruhe, Germany, Aug 25-29, 2003
-
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '03), Karlsruhe, Germany, Aug 25-29, 2003
-
-
Carzaniga, A.1
Wolf, A.L.2
-
7
-
-
70349266254
-
FairplayMP: A System for Secure Multi-Party Computation
-
Assaf Ben-David, Noam Nisan, and Benny Pinkas, "FairplayMP: A System for Secure Multi-Party Computation," Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08), Alexandria, VA, USA, Oct 27-31, 2008
-
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08), Alexandria, VA, USA, Oct 27-31, 2008
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
8
-
-
1642384656
-
Leveraging the Multi in Secure Multi-Party Computation
-
Jaideep Vaidya and Chris Clifton, "Leveraging the Multi in Secure Multi-Party Computation," Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society (WPES '03), Washington, DC, USA, Oct 30, 2003
-
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society (WPES '03), Washington, DC, USA, Oct 30, 2003
-
-
Vaidya, J.1
Clifton, C.2
-
9
-
-
79951642373
-
Round-Optimal Secure Two-Party Computation
-
Jonathan Katz and Rafail Ostrovsky, "Round-Optimal Secure Two-Party Computation," Proceedings of CRYPTO 2004: Advances in Cryptology, Santa Barbara CA, Aug 15-19, 2004
-
Proceedings of CRYPTO 2004: Advances in Cryptology, Santa Barbara CA, Aug 15-19, 2004
-
-
Katz, J.1
Ostrovsky, R.2
-
10
-
-
70350642087
-
Fully Homomorphic Encryption using Ideal Lattices
-
Craig Gentry, "Fully Homomorphic Encryption using Ideal Lattices," Proceedings of the 41st Annual ACM Symposium on theory of Computing (STOC '09), Bethesda, MD, USA, May 31-Jun 02, 2009
-
Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC '09), Bethesda, MD, USA, May 31-Jun 02, 2009
-
-
Gentry, C.1
-
11
-
-
36749033301
-
Private Searching on Streaming Data
-
Oct
-
Rafail Ostrovsky, William E. Skeith, III, "Private Searching on Streaming Data," Journal of Cryptology , Volume 20 Issue 4, Oct 2007
-
(2007)
Journal of Cryptology
, vol.20
, Issue.4
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
12
-
-
79951655096
-
How to Explain Zero-Knowledge Protocols to your Children
-
Jean-Jacques Quisquater, Myriam Quisquater, Muriel Quisquater, Michael Quisquater, Louis Guillou, Marie Annick Guillou, Gaid Guillou, Anna Guillou, Gwenole Guillou, Soazig Guillou, and Thomas A. Berson, "How to Explain Zero-Knowledge Protocols to your Children," Proceedings on Advances in Cryptology Santa Barbara, CA, USA, Aug 20-24, 1989
-
Proceedings on Advances in Cryptology Santa Barbara, CA, USA, Aug 20-24, 1989
-
-
Quisquater, J.-J.1
Quisquater, M.2
Quisquater, M.3
Quisquater, M.4
Guillou, L.5
Guillou, M.A.6
Guillou, G.7
Guillou, A.8
Guillou, G.9
Guillou, S.10
Berson, T.A.11
-
14
-
-
79951613756
-
Overview of AMS (CCSDS Asynchronous Message Service)
-
Scott Burleigh, "Overview of AMS (CCSDS Asynchronous Message Service)," DARPA DTN Phase 2 Kickoff, Arlington, VA, USA, Aug 9, 2006
-
DARPA DTN Phase 2 Kickoff, Arlington, VA, USA, Aug 9, 2006
-
-
Burleigh, S.1
-
15
-
-
77951592282
-
Delay-Tolerant Networking Architecture
-
Apr
-
Vint Cerf, Scott Burleigh, Adrian Hooke, Leigh Torgerson, Robert Durst, Keith Scott, Kevin Fall, and Howard Weiss, "Delay-Tolerant Networking Architecture," RFC 4838, Apr 2007
-
(2007)
RFC
, vol.4838
-
-
Cerf, V.1
Burleigh, S.2
Hooke, A.3
Torgerson, L.4
Durst, R.5
Scott, K.6
Fall, K.7
Weiss, H.8
-
16
-
-
67650690349
-
Bundle Protocol Specification
-
Nov
-
Keith Scott and Scott Burleigh, "Bundle Protocol Specification," RFC 5050, Nov 2007
-
(2007)
RFC
, vol.5050
-
-
Scott, K.1
Burleigh, S.2
-
18
-
-
69949125415
-
A New Way to Look at Networking
-
August 30
-
Van Jacobson, "A New Way to Look at Networking," Google Tech Talks, August 30, 2006, http://video.google.com/videoplay?docid=- 6972678839686672840#
-
(2006)
Google Tech Talks
-
-
-
19
-
-
33244488406
-
Secure indexes
-
ePrint Archive, Report 2003/216
-
Eu-Jin Goh, "Secure indexes", Cryptology ePrint Archive, Report 2003/216, 2003.
-
(2003)
Cryptology
-
-
Goh, E.-J.1
-
20
-
-
79951592635
-
Practical Techniques for Searches on Encrypted Data, with Dawn Song and David Wagner
-
Practical Techniques for Searches on Encrypted Data, with Dawn Song and David Wagner. In Proc. of IEEE Security and Privacy Symposium, May 2000
-
Proc. of IEEE Security and Privacy Symposium, May 2000
-
-
-
21
-
-
44049096900
-
Privacy preserving keyword searches on remote encrypted data
-
Yan-Cheng Chang and Michael Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data." in ACNS, 2005.
-
(2005)
ACNS
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
23
-
-
0022161539
-
A Depth-Universal Circuit
-
Stephen A. Cook, H. James Hoover: A Depth-Universal Circuit. SIAM J. Comput. 14(4): 833-839 (1985)
-
(1985)
SIAM J. Comput.
, vol.14
, Issue.4
, pp. 833-839
-
-
Cook, S.A.1
Hoover, H.J.2
-
25
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask)
-
DOI 10.1109/69.43410
-
S. Ceri, G. Gottlob, L. Tanca, "What you always wanted to know about Datalog (and never dared to ask)," IEEE Transactions on Knowledge and Data Engineering (1989) Volume: 1, Issue: 1, Pages: 146-166 (Pubitemid 20607001)
-
(1989)
IEEE Transactions on Knowledge and Data Engineering
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
26
-
-
79951652774
-
From Self-Forming Mobile Networks to Self-Forming Mobile Content Services
-
Keynote speech
-
Preston Marshall, "From Self-Forming Mobile Networks to Self-Forming Mobile Content Services," Keynote speech, ACM MobiCom 2008, San Francisco, CA, USA, September 16, 2008, http://www.sigmobile.org/mobicom/2008/MobiCom08- Marshall-Keynote.pdf
-
ACM MobiCom 2008, San Francisco, CA, USA, September 16, 2008
-
-
Marshall, P.1
-
27
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Pascal Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," EUROCRYPT 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
|