-
1
-
-
69449084731
-
A meeting scheduling problem respecting time and space
-
Berger, F., Klein, R., Nussbaum, D., Sack, J.-R., Yi, J.: A meeting scheduling problem respecting time and space. GeoInformatica (2009)
-
(2009)
GeoInformatica
-
-
Berger, F.1
Klein, R.2
Nussbaum, D.3
Sack, J.-R.4
Yi, J.5
-
2
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
85158868016
-
Asynchronous group key exchange with failures
-
Cachin, C., Strobl, R.: Asynchronous group key exchange with failures. In: ACM PODC 2004 (2004)
-
(2004)
ACM PODC 2004
-
-
Cachin, C.1
Strobl, R.2
-
4
-
-
78650421160
-
Gangs: Gather, authenticate 'n group securely
-
Chen, C.-H.O., Chen, C.-W., Kuo, C., Lai, Y.-H.,McCune, J.M., Studer, A., Perrig, A., Yang, B.-Y., Wu, T.-C.: Gangs: Gather, authenticate 'n group securely. In: ACM MobiCom 2008 (2008)
-
(2008)
ACM MobiCom 2008
-
-
Chen, C.-H.O.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31 (1985)
-
(1985)
IEEE Transactions on Information Theory
, pp. 31
-
-
ElGamal, T.1
-
7
-
-
85158898682
-
-
Facebook Deals, http://www.facebook.com/deals/
-
Facebook Deals
-
-
-
8
-
-
77952944272
-
-
Facebook Statistics, http://www.facebook.com/press/info.php?statistics
-
Facebook Statistics
-
-
-
9
-
-
84893582228
-
-
(last visited February 04, 2011)
-
Foursquare for Business, http://foursquare.com/business/ (last visited February 04, 2011)
-
Foursquare for Business
-
-
-
12
-
-
67650320950
-
A survey of computational location privacy
-
Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391-399 (2009)
-
(2009)
Personal and Ubiquitous Computing
, vol.13
, Issue.6
, pp. 391-399
-
-
Krumm, J.1
-
13
-
-
14544269130
-
IBM computer usability satisfaction questionnaires: Psychometric evaluation and instructions for use
-
Lewis, J.: IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction 7 (1995)
-
(1995)
International Journal of Human-Computer Interaction
, pp. 7
-
-
Lewis, J.1
-
15
-
-
70450239642
-
Spate: Small-group PKI-less authenticated trust establishment
-
Lin, Y.-H., Studer, A., Hsiao, H.-C., McCune, J.M., Wang, K.-H., Krohn, M., Lin, P.-L., Perrig, A., Sun, H.-M., Yang, B.-Y.: Spate: Small-group PKI-less authenticated trust establishment. In: MobiSys 2009 (2009)
-
(2009)
MobiSys 2009
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
16
-
-
85158814611
-
-
MeetWays, http://www.meetways.com/
-
-
-
-
17
-
-
85158863191
-
-
Mezzoman, http://www.mezzoman.com/
-
-
-
-
19
-
-
79961184995
-
-
Orange Taxi sharing app, http://event.orange.com/default/EN/all/mondial auto en/taxi partage.htm
-
Orange Taxi Sharing App
-
-
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223
-
-
Paillier, P.1
-
21
-
-
85158847635
-
-
Please Rob Me, http://pleaserobme.com/
-
-
-
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978)
-
(1978)
Communications of the ACM
, pp. 21
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
24
-
-
69449095378
-
Where shall we meet? Proposing optimal locations for meetings
-
Santos, P., Vaughn, H.: Where shall we meet? Proposing optimal locations for meetings. In: MapISNet 2007 (2007)
-
(2007)
MapISNet 2007
-
-
Santos, P.1
Vaughn, H.2
-
25
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Schoenmakers, B.: A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 148. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 148
-
-
Schoenmakers, B.1
-
26
-
-
79961202758
-
Privacy protection in location-based services through a public-key privacy homomorphism
-
Solanas, A., Martínez-Ballesté, A.: Privacy protection in location-based services through a public-key privacy homomorphism. In: Public Key Infrastructure (2007)
-
(2007)
Public Key Infrastructure
-
-
Solanas, A.1
Martínez-Ballesté, A.2
-
27
-
-
85158905462
-
-
UTM coordinate system, https://www.e-education.psu.edu/natureofgeoinfo/ c2-p21.html
-
UTM Coordinate System
-
-
-
28
-
-
38149079700
-
Louis, lester and pierre: Three protocols for location privacy
-
Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Privacy Enhancing Technologies, pp. 62-76 (2007)
-
(2007)
Privacy Enhancing Technologies
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|