-
1
-
-
68249129760
-
-
Technical Report UCB/EECS-2009-28, EECS Department, UC Berkeley
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: A Berkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECS Department, UC Berkeley (2009)
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
2
-
-
84928743703
-
Precomputing Oblivious Transfer
-
Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
-
Beaver, D.: Precomputing Oblivious Transfer. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 97-109. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 97-109
-
-
Beaver, D.1
-
3
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
ACM Press
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: A system for secure multi-party computation. In: 15th ACM Conf. on Computer and Communications Security, pp. 257-266. ACM Press (2008)
-
(2008)
15th ACM Conf. on Computer and Communications Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
4
-
-
57049188348
-
Sharemind: A Framework for Fast Privacy-Preserving Computations
-
Jajodia, S., Lopez, J. (eds.) ESORICS 2008. Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
5
-
-
70350379222
-
Secure Multiparty Computation Goes Live
-
Dingledine, R., Golle, P. (eds.) FC 2009. Springer, Heidelberg
-
Bogetoft, P., Christensen, D.L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325-343. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5628
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
6
-
-
33750056675
-
A practical implementation of secure auctions based on multiparty integer computation
-
Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
Bogetoft, P., Damgård, I., Jakobsen, T., Nielsen, K., Pagter, J., Toft, T.: A Practical Implementation of Secure Auctions Based on Multiparty Integer Computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142-147. Springer, Heidelberg (2006) (Pubitemid 44577283)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4107 LNCS
, pp. 142-147
-
-
Bogetoft, P.1
Damgard, I.2
Jakobsen, T.3
Nielsen, K.4
Pagter, J.5
Toft, T.6
-
7
-
-
84863447066
-
SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics
-
USENIX Association
-
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In: 19th USENIX Security Symposium, pp. 223-240. USENIX Association (2010)
-
(2010)
19th USENIX Security Symposium
, pp. 223-240
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
8
-
-
20744437602
-
The grid economy
-
Buyya, R., Abramson, D., Venugopal, S.: The grid economy. Proc. IEEE 93(3), 698-714 (2005)
-
(2005)
Proc. IEEE
, vol.93
, Issue.3
, pp. 698-714
-
-
Buyya, R.1
Abramson, D.2
Venugopal, S.3
-
9
-
-
84947242606
-
Dynamic Replica Placement for Scalable Content Delivery
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Chen, Y., Katz, R.H., Katz, Y.H., Kubiatowicz, J.D.: Dynamic Replica Placement for Scalable Content Delivery. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 306-318. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 306-318
-
-
Chen, Y.1
Katz, R.H.2
Katz, Y.H.3
Kubiatowicz, J.D.4
-
10
-
-
84863273531
-
Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces
-
ePrint Archive, Report 2011/257
-
Choi, S.G., Hwang, K., Katz, J., Malkin, T., Rubenstein, D.: Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Cryptology ePrint Archive, Report 2011/257 (2011), http://eprint.iacr.org/2011/257
-
(2011)
Cryptology
-
-
Choi, S.G.1
Hwang, K.2
Katz, J.3
Malkin, T.4
Rubenstein, D.5
-
11
-
-
67049134126
-
Asynchronous Multiparty Computation: Theory and Implementation
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous Multiparty Computation: Theory and Implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
12
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
13
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM Press
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: 19th ACM STOC Annual ACM Symposium on Theory of Computing (STOC), pp. 218-229. ACM Press (1987)
-
(1987)
19th ACM STOC Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
ACM Press
-
Henecka,W., Kögl, S., Sadeghi, A.-R., Schneider, T.,Wehrenberg, I.: TASTY: Tool for automating secure two-party computations. In: 17th ACM Conf. on Computer and Communications Security (CCCS), pp. 451-462. ACM Press (2010)
-
(2010)
17th ACM Conf. on Computer and Communications Security (CCCS)
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
15
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
USENIX Association
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: 20th USENIX Security Symposium. USENIX Association (2011)
-
(2011)
20th USENIX Security Symposium
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
16
-
-
24144457853
-
Extending Oblivious Transfers Efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending Oblivious Transfers Efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
17
-
-
77956992754
-
Efficient Implementation of the Orlandi Protocol
-
Zhou, J., Yung, M. (eds.) ACNS 2010. Springer, Heidelberg
-
Jakobsen, T.P., Makkes, M.X., Nielsen, J.D.: Efficient Implementation of the Orlandi Protocol. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 255-272. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6123
, pp. 255-272
-
-
Jakobsen, T.P.1
Makkes, M.X.2
Nielsen, J.D.3
-
18
-
-
0036497474
-
Object replication strategies in content distribution networks
-
Kangasharju, J., Roberts, J., Ross, K.W.: Object replication strategies in content distribution networks. Computer Communications 25(4), 376-383 (2002)
-
(2002)
Computer Communications
, vol.25
, Issue.4
, pp. 376-383
-
-
Kangasharju, J.1
Roberts, J.2
Ross, K.W.3
-
19
-
-
71549170830
-
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
20
-
-
56449122093
-
Evolutionary Market Agents for Resource Allocation in Decentralised Systems
-
Rudolph, G., Jansen, T., Lucas, S., Poloni, C., Beume, N. (eds.) PPSN 2008. Springer, Heidelberg
-
Lewis, P.R., Marrow, P., Yao, X.: Evolutionary Market Agents for Resource Allocation in Decentralised Systems. In: Rudolph, G., Jansen, T., Lucas, S., Poloni, C., Beume, N. (eds.) PPSN 2008. LNCS, vol. 5199, pp. 1071-1080. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5199
, pp. 1071-1080
-
-
Lewis, P.R.1
Marrow, P.2
Yao, X.3
-
21
-
-
84863259444
-
Efficient reduction of 1-out-of-n oblivious transfers in random oracle model
-
ePrint Archive, Report 2005/279
-
Li, B., Li, H., Xu, G., Xu, H.: Efficient reduction of 1-out-of-n oblivious transfers in random oracle model. Cryptology ePrint Archive, Report 2005/279 (2005)
-
(2005)
Cryptology
-
-
Li, B.1
Li, H.2
Xu, G.3
Xu, H.4
-
22
-
-
52149120767
-
Implementing Two-Party Computation Efficiently with Security against Malicious Adversaries
-
Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008 Springer, Heidelberg
-
Lindell, Y., Pinkas, B., Smart, N.P.: Implementing Two-Party Computation Efficiently with Security against Malicious Adversaries. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 2-20. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5229
, pp. 2-20
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
24
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
USENIX Association
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: 13th USENIX Security Symposium, pp. 287-302. USENIX Association (2004)
-
(2004)
13th USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
25
-
-
22044454088
-
Computationally secure oblivious transfer
-
Naor, M., Pinkas, B.: Computationally secure oblivious transfer. J. Cryptology 18(1), 1-35 (2005)
-
(2005)
J. Cryptology
, vol.18
, Issue.1
, pp. 1-35
-
-
Naor, M.1
Pinkas, B.2
-
26
-
-
72449131818
-
Secure Two-Party Computation is Practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure Two-Party Computation is Practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
27
-
-
36849086313
-
Trading grid services - A multi-attribute combinatorial approach
-
Schnizler, B., Neumann, D., Veit, D., Weinhardt, C.: Trading grid services - a multi-attribute combinatorial approach. European J. Operational Research 187(3), 943-961 (2008)
-
(2008)
European J. Operational Research
, vol.187
, Issue.3
, pp. 943-961
-
-
Schnizler, B.1
Neumann, D.2
Veit, D.3
Weinhardt, C.4
-
28
-
-
47249166044
-
Market-based grid resource allocation using a stable continuous double auction
-
IEEE
-
Tan, Z., Gurd, J.R.: Market-based grid resource allocation using a stable continuous double auction. In: Proc. 8th IEEE/ACM Intl. Conf. on Grid Computing, pp. 283-290. IEEE (2007)
-
(2007)
Proc. 8th IEEE/ACM Intl. Conf. on Grid Computing
, pp. 283-290
-
-
Tan, Z.1
Gurd, J.R.2
-
29
-
-
0035455636
-
Analyzing market-based resource allocation strategies for the computational grid
-
Wolski, R., Plank, J.S., Brevik, J., Bryan, T.: Analyzing market-based resource allocation strategies for the computational grid. International Journal of High Performance Computing Applications 15(3), 258-281 (2006)
-
(2006)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 258-281
-
-
Wolski, R.1
Plank, J.S.2
Brevik, J.3
Bryan, T.4
|