-
1
-
-
70249112675
-
Awareness Networking in Wireless Environments: Means of Exchanging Information
-
Ahtiainen, A., Kalliojarvi, K., Kasslin, M., Leppanen, K., Richter, A., Ruuska, P., Wijting, C.: Awareness Networking in Wireless Environments: Means of Exchanging Information. IEEE Vehicular Technology Magazine, 48-54 (2009).
-
(2009)
IEEE Vehicular Technology Magazine
, pp. 48-54
-
-
Ahtiainen, A.1
Kalliojarvi, K.2
Kasslin, M.3
Leppanen, K.4
Richter, A.5
Ruuska, P.6
Wijting, C.7
-
2
-
-
79952501372
-
(If) Size Matters: Size-hiding private set intersection
-
PKC Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Springer, Heidelberg
-
PKC. Ateniese, G., De Cristofaro, E., Tsudik, G.: (If) Size Matters: Size-Hiding Private Set Intersection. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC. 2011. LNCS, vol. 6571, pp. 156-173. Springer, Heidelberg (2011).
-
(2011)
PKC. 2011. LNCS
, vol.6571
, pp. 156-173
-
-
Ateniese, G.1
De Cristofaro, E.2
Tsudik, G.3
-
3
-
-
0038487086
-
Secret Handshakes from Pairing-Based Key Agreements
-
Balfanz, D., Durfee, G., Shankar, N., Smetters, D.K., Staddon, J., Wong, H.-C.: Secret Handshakes from Pairing-Based Key Agreements. In: IEEE Symposium on Security and Privacy, pp. 180-196 (2003).
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
4
-
-
0027726717
-
-
Random oracles are practical: A Paradigm for designing efficient protocols
-
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: ACM CCS, pp. 62-73 (1993).
-
(1993)
ACM CCS
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires' problem
-
DOI 10.1016/S0166-218X(00)00342-5, PII S0166218X00003425
-
Boudot, F., Schoenmakers, B., Traoŕe, J.: A Fair and Efficient Solution to the Socialist Millionaires' Problem. Discrete Applied Mathematics 111(1-2), 23-36 (2001). (Pubitemid 33676119)
-
(2001)
Discrete Applied Mathematics
, vol.111
, Issue.1-2
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traore, J.3
-
6
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
Bradshaw, R., Holt, J., Seamons, K.: Concealing Complex Policies with Hidden Credentials. In: ACM CCS, pp. 146-157 (2004). (Pubitemid 40338197)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 146-157
-
-
Bradshaw, R.W.1
Holt, J.E.2
Seamons, K.E.3
-
8
-
-
77956987281
-
Credential authenticated identification and key exchange
-
Rabin, T. (ed.) Springer, Heidelberg
-
Camenisch, J., Casati, N., Groß, T., Shoup, V.: Credential Authenticated Identification and Key Exchange. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 255-276. Springer, Heidelberg (2010).
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 255-276
-
-
Camenisch, J.1
Casati, N.2
Groß, T.3
Shoup, V.4
-
9
-
-
84945135810
-
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Camenisch, J., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001). (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
10
-
-
70350400269
-
Private intersection of certified sets
-
Dingledine, R., Golle, P. (eds.) Springer, Heidelberg
-
Camenisch, J., Zaverucha, G.M.: Private intersection of certified sets. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 108-127. Springer, Heidelberg (2009).
-
(2009)
FC 2009. LNCS
, vol.5628
, pp. 108-127
-
-
Camenisch, J.1
Zaverucha, G.M.2
-
11
-
-
35048855095
-
Secret handshakes from CA-oblivious encryption
-
Castelluccia, C., Jarecki, S., Tsudik, G.: Secret Handshakes from CA-Oblivious Encryption. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 293-307. Springer, Heidelberg (2004). (Pubitemid 39747761)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 293-307
-
-
Castelluccia, C.1
Jarecki, S.2
Tsudik, G.3
-
12
-
-
74049164714
-
Common friends discovery with privacy and authenticity
-
Chiou, S., Chang, S., Sun, H.: Common Friends Discovery with Privacy and Authenticity. In: IAS, pp. 337-340 (2009).
-
(2009)
IAS
, pp. 337-340
-
-
Chiou, S.1
Chang, S.2
Sun, H.3
-
13
-
-
68949136946
-
Efficient Robust Private Set Intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009).
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
14
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
Abe, M. (ed.) Springer, Heidelberg
-
De Cristofaro, E., Kim, J., Tsudik, G.: Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213-231. Springer, Heidelberg (2010).
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 213-231
-
-
De Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
15
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
Sion, R. (ed.) Springer, Heidelberg
-
De Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143-159. Springer, Heidelberg (2010).
-
(2010)
FC 2010. LNCS
, vol.6052
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
16
-
-
84957695516
-
Securing traceability of ciphertexts - Towards a secure software key escrow System
-
Guillou, L.C., Quisquater, J.-J. (eds.) Springer, Heidelberg
-
Desmedt, Y.: Securing Traceability of Ciphertexts - Towards a Secure Software Key Escrow System. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 147-157. Springer, Heidelberg (1995).
-
(1995)
EUROCRYPT 1995. LNCS
, vol.921
, pp. 147-157
-
-
Desmedt, Y.1
-
17
-
-
36348952601
-
Relationship identification for social network discovery
-
AAAI-07/IAAI-07 Proceedings: 22nd AAAI Conference on Artificial Intelligence and the 19th Innovative Applications of Artificial Intelligence Conference
-
Diehl, C., Namata, G., Getoor, L.: Relationship Identification for Social Network Discovery. AAAI 22(1), 546-552 (2007). (Pubitemid 350149627)
-
(2007)
Proceedings of the National Conference on Artificial Intelligence
, vol.1
, pp. 546-552
-
-
Diehl, C.P.1
Namata, G.2
Getoor, L.3
-
18
-
-
84877698512
-
-
Free Software Foundation
-
Free Software Foundation. The GNU MP Bignum Library, http://gmplib.org/.
-
The GNU MP Bignum Library
-
-
-
19
-
-
70349798920
-
Efficient private techniques for verifying social proximity
-
Freedman, M.J., Nicolosi, A.: Efficient Private Techniques for Verifying Social Proximity. In: IPTPS (2007).
-
(2007)
IPTPS
-
-
Freedman, M.J.1
Nicolosi, A.2
-
20
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004).
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
21
-
-
0023545076
-
How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In: 19th STOC, pp. 218-229 (1987). (Pubitemid 18643409)
-
(1987)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
22
-
-
79959316417
-
Cryptographic treatment of private user profiles
-
Springer, Heidelberg
-
G̈unther, F., Manulis, M., Strufe, T.: Cryptographic Treatment of Private User Profiles. In: Financial Cryptography Workshops. Springer, Heidelberg (2011), http://eprint.iacr.org/2011/064.
-
(2011)
Financial Cryptography Workshops
-
-
G̈unther, F.1
Manulis, M.2
Strufe, T.3
-
23
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC. 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008).
-
(2008)
TCC. 2008. LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
24
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
Nguyen, P.Q., Pointcheval, D. (eds.) Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010).
-
(2010)
PKC 2010. LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
25
-
-
84883891962
-
Enhancing privacy and trust in electronic communities
-
Huberman, B., Franklin, M., Hogg, T.: Enhancing Privacy and Trust in Electronic Communities. In: ACM Conference on Electronic Commerce, pp. 78-86 (1999).
-
(1999)
ACM Conference on Electronic Commerce
, pp. 78-86
-
-
Huberman, B.1
Franklin, M.2
Hogg, T.3
-
26
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
DOI 10.1007/978-3-540-79263-5-23, Topics in Cryptology - CT-RSA 2008 - The Cryptographers' Track at the RSA Conference 2008, Proceedings
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 352-369. Springer, Heidelberg (2008). (Pubitemid 351641994)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4964
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
27
-
-
49049101312
-
Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials
-
Aceto, L., Damgard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A.,Walukiewicz, I. (eds.) Springer, Heidelberg
-
Jarecki, S., Liu, X.: Affiliation-Hiding Envelope and Authentication Schemes with Efficient Support for Multiple Credentials. In: Aceto, L., Damgard, I., Goldberg, L.A., Halld́orsson, M.M., Inǵolfsd́ottir, A.,Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 715-726. Springer, Heidelberg (2008).
-
(2008)
ICALP 2008, Part II. LNCS
, vol.5126
, pp. 715-726
-
-
Jarecki, S.1
Liu, X.2
-
28
-
-
70350325165
-
Private mutual authentication and conditional oblivious transfer
-
Halevi, S. (ed.) Springer, Heidelberg
-
Jarecki, S., Liu, X.: Private Mutual Authentication and Conditional Oblivious Transfer. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 90-107. Springer, Heidelberg (2009).
-
(2009)
CRYPTO 2009. LNCS
, vol.5677
, pp. 90-107
-
-
Jarecki, S.1
Liu, X.2
-
29
-
-
77958056561
-
Fast secure computation of set intersection
-
Garay, J.A., De Prisco, R. (eds.) Springer, Heidelberg
-
Jarecki, S., Liu, X.: Fast Secure Computation of Set Intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010).
-
(2010)
CN 2010. LNCS
, vol.6280
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
30
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Kissner, L., Song, D.X.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005). (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
31
-
-
70349248583
-
Link privacy in social networks
-
Korolova, A., Motwani, R., Nabar, S., Xu, Y.: Link Privacy in Social Networks. In: CIKM, pp. 289-298 (2008).
-
(2008)
CIKM
, pp. 289-298
-
-
Korolova, A.1
Motwani, R.2
Nabar, S.3
Xu, Y.4
-
32
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Naor, M. (ed.) Springer, Heidelberg
-
Lindell, Y., Pinkas, B.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 52-78. Springer, Heidelberg (2007).
-
(2007)
EUROCRYPT 2007. LNCS
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
33
-
-
79956319602
-
Privacy-preserving group discovery with linear complexity
-
Zhou, J., Yung, M. (eds.) Springer, Heidelberg
-
Manulis, M., Pinkas, B., Poettering, B.: Privacy-Preserving Group Discovery with Linear Complexity. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 420-437. Springer, Heidelberg (2010).
-
(2010)
ACNS 2010. LNCS
, vol.6123
, pp. 420-437
-
-
Manulis, M.1
Pinkas, B.2
Poettering, B.3
-
35
-
-
79956319822
-
Affiliation-hiding key exchange with untrusted group authorities
-
Zhou, J., Yung, M. (eds.) Springer, Heidelberg
-
Manulis, M., Poettering, B., Tsudik, G.: Affiliation-Hiding Key Exchange with Untrusted Group Authorities. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 402-419. Springer, Heidelberg (2010).
-
(2010)
ACNS 2010. LNCS
, vol.6123
, pp. 402-419
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
36
-
-
77955440831
-
Taming big brother ambitions: More privacy for secret handshakes
-
Atallah, M.J., Hopper, N.J. (eds.) Springer, Heidelberg
-
Manulis, M., Poettering, B., Tsudik, G.: Taming Big Brother Ambitions: More Privacy for Secret Handshakes. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 149-165. Springer, Heidelberg (2010).
-
(2010)
PETS 2010. LNCS
, vol.6205
, pp. 149-165
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
37
-
-
84964242030
-
Key distribution systems based on identification information
-
Pomerance, C. (ed.) Springer, Heidelberg
-
Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194-202. Springer, Heidelberg (1988).
-
(1988)
CRYPTO 1987. LNCS
, vol.293
, pp. 194-202
-
-
Okamoto, E.1
-
38
-
-
33646530046
-
Computing communities in large networks using random walks
-
Yolum, p. G̈ung̈or, T., G̈urgen, F., ̈Ozturan, C. (eds.) Springer, Heidelberg
-
Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. In: Yolum, p., G̈ung̈or, T., G̈urgen, F., ̈Ozturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 284-293. Springer, Heidelberg (2005).
-
(2005)
ISCIS 2005. LNCS
, vol.3733
, pp. 284-293
-
-
Pons, P.1
Latapy, M.2
-
39
-
-
79959301236
-
The Facebook
-
The Facebook, Inc. Facebook's statistics (2010), http://www.facebook.com/ press/info.php?statistics.
-
(2010)
Inc. Facebook's Statistics
-
-
-
40
-
-
56749173469
-
Veneta: Serverless friend-of- friend detection in mobile social networking
-
Von Arb, M., Bader, M., Kuhn, M., Wattenhofer, R.: Veneta: Serverless Friend-of- Friend Detection in Mobile Social Networking. In: WiMob, pp. 184-189 (2008).
-
(2008)
WiMob
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
42
-
-
0022882770
-
How to Generate and Exchange Secrets
-
Yao, A.: How to Generate and Exchange Secrets. In: 27th FOCS, pp. 162-167 (1986).
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.1
-
43
-
-
84919835260
-
-
Springer, Heidelberg
-
Yu, P.S., Han, J., Faloutsos, C.: Link Mining: Models, Algorithms, and Applications. Springer, Heidelberg (2010).
-
(2010)
Link Mining: Models Algorithms and Applications
-
-
Yu, P.S.1
Han, J.2
Faloutsos, C.3
-
44
-
-
78650110617
-
Using friendship ties and family circles for link prediction
-
Zheleva, E., Getoor, L., Golbeck, J., Kuter, U.: Using Friendship Ties and Family Circles for Link Prediction. In: SNA-KDD, pp. 97-113 (2008)
-
(2008)
SNA-KDD
, pp. 97-113
-
-
Zheleva, E.1
Getoor, L.2
Golbeck, J.3
Kuter, U.4
|