-
1
-
-
84864057509
-
-
Apache. ActiveMQ. http://activemq.apache.org/.
-
Apache
-
-
-
2
-
-
67650135696
-
Key-private proxy re-encryption
-
Berlin, Heidelberg Springer-Verlag
-
G. Ateniese, K. Benson, and S. Hohenberger. Key-private proxy re-encryption. In RSA '09, pages 279-294, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
RSA '09
, pp. 279-294
-
-
Ateniese, G.1
Benson, K.2
Hohenberger, S.3
-
3
-
-
13844271963
-
Selective and authentic third-party distribution of XML documents
-
DOI 10.1109/TKDE.2004.63
-
E. Bertino, B. Carminati, E. Ferrari, B. Thuraisingham, and A. Gupta. Selective and authentic third-party distribution of XML documents. IEEE TKDE, 16(10):1263-1278, Oct. 2004. (Pubitemid 40242338)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.4
Gupta, A.5
-
5
-
-
38049045519
-
Conjunctive, subset, and range queries on encrypted data
-
May
-
D. Boneh and B. Waters. Conjunctive, subset, and range queries on encrypted data. Theory of Cryptography, pages 535-554, May 2007.
-
(2007)
Theory of Cryptography
, pp. 535-554
-
-
Boneh, D.1
Waters, B.2
-
7
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Springer-Verlag
-
J. Camenisch and A. Lysyanskaya. Signature schemes and anonymous credentials from bilinear maps. In CRYPTO '04, pages 56-72. Springer-Verlag, 2004.
-
(2004)
CRYPTO '04
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
DOI 10.1145/380749.380767
-
A. Carzaniga, D. S. Rosenblum, and A. L. Wolf. Design and evaluation of a wide-area event notification service. ACM TCS, 19(3):332-383, 2001. (Pubitemid 33619857)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
9
-
-
84864034517
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
S. Choi, G. Ghinita, and E. Bertino. A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In DEXA '10, 2010.
-
(2010)
DEXA '10
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
10
-
-
0029541045
-
Private information retrieval
-
Oct
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In FOCS '95, pages 41-50, Oct 1995.
-
(1995)
FOCS '95
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
11
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
I. Damgård, M. Geisler, and M. Kroigard. Homomorphic encryption and secure comparison. Int. J. on App. Crypto., 1(1):22-31, 2008.
-
(2008)
Int. J. on App. Crypto.
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgård, I.1
Geisler, M.2
Kroigard, M.3
-
13
-
-
0345565888
-
The many faces of publish/subscribe
-
P. Eugster, P. Felber, R. Guerraoui, and A. Kermarrec. The many faces of publish/subscribe. ACM Comp. Survey, 35(2):114-131, 2003.
-
(2003)
ACM Comp. Survey
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.4
-
15
-
-
0031378815
-
Replication is NOT needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is NOT needed: Single database, computationally-private information retrieval. In FOCS '97, pages 364-373, 1997.
-
(1997)
FOCS '97
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
16
-
-
50049099260
-
Proxy re-encryption systems for identity-based encryption
-
T. Matsuo. Proxy re-encryption systems for identity-based encryption. In PAIRING '07, pages 247-267, 2007.
-
(2007)
PAIRING '07
, pp. 247-267
-
-
Matsuo, T.1
-
17
-
-
70349244709
-
Secure aggregation in a publish-subscribe system
-
New York, NY, USA ACM
-
K. Minami, A. J. Lee, M. Winslett, and N. Borisov. Secure aggregation in a publish-subscribe system. In WPES '08, pages 95-104, New York, NY, USA, 2008. ACM.
-
(2008)
WPES '08
, pp. 95-104
-
-
Minami, K.1
Lee, A.J.2
Winslett, M.3
Borisov, N.4
-
18
-
-
52649121745
-
Secure delta-publishing of XML content
-
April
-
M. Nabeel and E. Bertino. Secure delta-publishing of XML content. In ICDE '08, pages 1361-1363, April 2008.
-
(2008)
ICDE '08
, pp. 1361-1363
-
-
Nabeel, M.1
Bertino, E.2
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT '99, pages 223-238, 1999.
-
(1999)
EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
London, UK Springer-Verlag
-
T. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '92, pages 129-140, London, UK, 1992. Springer-Verlag.
-
(1992)
CRYPTO '92
, pp. 129-140
-
-
Pedersen, T.1
-
21
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
28 2006-Sept. 1
-
C. Raiciu and D. S. Rosenblum. Enabling confidentiality in content-based publish/subscribe infrastructures. In SECURECOMM '06, pages 1-11, 28 2006-Sept. 1 2006.
-
(2006)
SECURECOMM '06
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
22
-
-
77952783550
-
A privacy-preserving approach to policy-based content dissemination
-
N. Shang, M. Nabeel, F. Paci, and E. Bertino. A privacy-preserving approach to policy-based content dissemination. In ICDE '10, 2010.
-
(2010)
ICDE '10
-
-
Shang, N.1
Nabeel, M.2
Paci, F.3
Bertino, E.4
-
23
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Washington, DC, USA IEEE Computer Society
-
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In SP '00, page 44, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
SP '00
, pp. 44
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
24
-
-
33745798637
-
Securing publish-subscribe overlay services with eventGuard
-
DOI 10.1145/1102120.1102158, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
M. Srivatsa and L. Liu. Securing publish-subscribe overlay services with eventguard. In CCS '05, pages 289-298, New York, NY, USA, 2005. ACM. (Pubitemid 44022012)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 289-298
-
-
Srivatsa, M.1
Liu, L.2
-
25
-
-
34848864560
-
Secure event dissemination in publish-subscribe networks
-
Washington, DC, USA IEEE Computer Society
-
M. Srivatsa and L. Liu. Secure event dissemination in publish-subscribe networks. In ICDCS '07, page 22, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
ICDCS '07
, pp. 22
-
-
Srivatsa, M.1
Liu, L.2
|