-
1
-
-
0041783510
-
Privacy-preserving data mining
-
ACM
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in SIGMOD, vol. 29, no. 2. ACM, 2000, pp. 439-450.
-
(2000)
SIGMOD
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Published by the IEEE Computer Society
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, "A concrete security treatment of symmetric encryption," in focs. Published by the IEEE Computer Society, 1997, p. 394.
-
(1997)
Focs
, pp. 394
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
3
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
(extended abstract), Springer
-
J. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)," in Advances in Cryptology?CRYPTO?86. Springer, 1987, pp. 251-260.
-
(1987)
Advances in Cryptology?CRYPTO?86
, pp. 251-260
-
-
Benaloh, J.1
-
4
-
-
36349034335
-
Towards optimal toom-cook multiplication for univariate and multivariate polynomials in characteristic 2 and 0
-
M. Bodrato, "Towards optimal toom-cook multiplication for univariate and multivariate polynomials in characteristic 2 and 0," Arithmetic of Finite Fields, pp. 116-133, 2007.
-
(2007)
Arithmetic of Finite Fields
, pp. 116-133
-
-
Bodrato, M.1
-
6
-
-
79960850152
-
Privacy-preserving multikeyword ranked search over encrypted cloud data
-
IEEE
-
N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy-preserving multikeyword ranked search over encrypted cloud data," in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 829-837.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of cryptology, vol. 1, no. 1, pp. 65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
9
-
-
78650018339
-
Dissent: Accountable anonymous group messaging
-
ACM
-
H. Corrigan-Gibbs and B. Ford, "Dissent: accountable anonymous group messaging," in ACM CCS. ACM, 2010, pp. 340-350.
-
(2010)
ACM CCS
, pp. 340-350
-
-
Corrigan-Gibbs, H.1
Ford, B.2
-
10
-
-
84861626240
-
-
Crypto++, http://www.cryptopp.com/, 2010.
-
(2010)
Crypto++
-
-
-
11
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
ACM
-
W. Du and M. Atallah, "Secure multi-party computation problems and their applications: a review and open problems," in Proceedings of the 2001 workshop on New security paradigms. ACM, 2001, pp. 13-22.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms
, pp. 13-22
-
-
Du, W.1
Atallah, M.2
-
12
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer
-
M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in Advances in Cryptology-EUROCRYPT 2004. Springer, 2004, pp. 1-19.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
0021409284
-
Probabilistic encryption* 1
-
S. Goldwasser and S. Micali, Probabilistic encryption* 1," Journal of computer and system sciences, vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
16
-
-
79960878565
-
Findu: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou, "Findu: Privacy-preserving personal profile matching in mobile social networks," in Proc. of Infocom, 2011.
-
Proc. of Infocom, 2011
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
18
-
-
85150485002
-
Location privacy via private proximity testing
-
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh, "Location privacy via private proximity testing," in Proc. of NDSS, 2011.
-
Proc. of NDSS, 2011
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
19
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," Public Key Cryptography-PKC 2007, pp. 343-360, 2007.
-
Public Key Cryptography-PKC 2007
, vol.2007
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
20
-
-
84861630620
-
-
ns 2
-
ns 2, http://www.isi.edu/nsnam/ns/.
-
-
-
-
21
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
77951431567
-
Eluding carnivores: File sharing with strong anonymity
-
ACM
-
E. Sirer, S. Goel, M. Robson, and D. Engin, "Eluding carnivores: File sharing with strong anonymity," in Proceedings of the 11th workshop on ACM SIGOPS European workshop. ACM, 2004, pp. 19-es.
-
(2004)
Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
-
-
Sirer, E.1
Goel, S.2
Robson, M.3
Engin, D.4
-
26
-
-
70849131456
-
Secure knn computation on encrypted databases
-
ACM
-
W. Wong, D. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in SIGMOD. ACM, 2009, pp. 139-152.
-
(2009)
SIGMOD
, pp. 139-152
-
-
Wong, W.1
Cheung, D.2
Kao, B.3
Mamoulis, N.4
-
27
-
-
32344451483
-
Anonymity-preserving data collection
-
ACM
-
Z. Yang, S. Zhong, and R. Wright, "Anonymity-preserving data collection,"in ACM SIGKDD. ACM, 2005, pp. 334-343.
-
(2005)
ACM SIGKDD
, pp. 334-343
-
-
Yang, Z.1
Zhong, S.2
Wright, R.3
-
28
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE
-
A. Yao, "How to generate and exchange secrets," in FOCS. IEEE, 1986, pp. 162-167.
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
|