-
1
-
-
0002757750
-
Keying hash functions for message authentication
-
London, UK
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '96, London, UK, 1996.
-
(1996)
Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '96
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Burton H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communication of the ACM, 13(7):422-426, 1970.
-
(1970)
Communication of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
3
-
-
0001655450
-
Design and evaluation of a wide-area event notification service
-
DOI 10.1145/380749.380767
-
Antonio Carzaniga, David S. Rosenblum, and Alexander L. Wolf. Design and evaluation of a wide-area event notification service. ACM Transactions on Computer Systems, 19(3):332-383, 2001. (Pubitemid 33619857)
-
(2001)
ACM Transactions on Computer Systems
, vol.19
, Issue.3
, pp. 332-383
-
-
Carzaniga, A.1
Rosenblum, D.S.2
Wolf, A.L.3
-
5
-
-
78049360046
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
volume 6261 of Lecture Notes in Computer Science
-
Sunoh Choi, Gabriel Ghinita, and Elisa Bertino. A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In Database and Expert Systems Applications, volume 6261 of Lecture Notes in Computer Science, pages 368-384, 2010.
-
(2010)
Database and Expert Systems Applications
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
6
-
-
0345565888
-
The many faces of publish/subscribe
-
Patrick Eugster, Pascal Felber, Rachid Guerraoui, and Anne-Marie Kermarrec. The many faces of publish/subscribe. ACM Computing Surveys, 35(2):114-131, 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.4
-
10
-
-
77956439681
-
The PADRES publish/subscribe system
-
Hans-Arno Jacobsen, Alex Cheung, Guoli Lia, Balasubramaneyam Maniymaran, Vinod Muthusamy, and Reza Sherafat Kazemzadeh. The PADRES publish/subscribe system. In Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies, 2009.
-
(2009)
Handbook of Research on Advanced Distributed Event-Based Systems, Publish/Subscribe and Message Filtering Technologies
-
-
Jacobsen, H.1
Cheung, A.2
Lia, G.3
Maniymaran, B.4
Muthusamy, V.5
Kazemzadeh, R.S.6
-
11
-
-
85139857286
-
MICS: An efficient content space representation model for publish/subscribe systems
-
Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian, and Mirko Montanari. MICS: an efficient content space representation model for publish/subscribe systems. In Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, DEBS '09, 2009.
-
(2009)
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, DEBS '09
-
-
Jafarpour, H.1
Mehrotra, S.2
Venkatasubramanian, N.3
Montanari, M.4
-
12
-
-
57549101419
-
Bloom filter based routing for content-based publish/subscribe
-
New York, NY, USA, ACM
-
Zbigniew Jerzak and Christof Fetzer. Bloom filter based routing for content-based publish/subscribe. In Proceedings of the second international conference on Distributed event-based systems, DEBS '08, pages 71-81, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the Second International Conference on Distributed Event-based Systems, DEBS '08
, pp. 71-81
-
-
Jerzak, Z.1
Fetzer, C.2
-
13
-
-
27944431765
-
A unified approach to routing, covering and merging in publish/subscribe systems based on modified binary decision diagrams
-
Washington, DC, USA
-
Guoli Li, Shuang Hou, and Hans-Arno Jacobsen. A unified approach to routing, covering and merging in publish/subscribe systems based on modified binary decision diagrams. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS '05, Washington, DC, USA, 2005.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, ICDCS '05
-
-
Li, G.1
Hou, S.2
Jacobsen, H.-A.3
-
14
-
-
50049113532
-
An efficient scheme for preserving confidentiality in content-based publish-subscribe systems
-
Georgia Institute of Technology
-
Jun Li, Chenghuai Lu, and Weidong Shi. An efficient scheme for preserving confidentiality in content-based publish-subscribe systems. Technical Report GIT-CC-04-01, College of Computing, Georgia Institute of Technology, 2004.
-
(2004)
Technical Report GIT-CC-04-01, College of Computing
-
-
Li, J.1
Lu, C.2
Shi, W.3
-
15
-
-
81155153612
-
Privacy-preserving filtering and covering in content-based publish subscribe systems
-
West Lafayette, Indiana, USA
-
Mohamed Nabeel, Ning Shang, and Elisa Bertino. Privacy-preserving filtering and covering in content-based publish subscribe systems. Technical Report 15, Purdue University, West Lafayette, Indiana, USA, 2009.
-
(2009)
Technical Report 15, Purdue University
-
-
Nabeel, M.1
Shang, N.2
Bertino, E.3
-
16
-
-
78049392713
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Baltimore, MD, USA
-
Costin Raiciu and David S. Rosenblum. Enabling confidentiality in content-based publish/subscribe infrastructures. In Proceedings of IEEE Securecomm, pages 1-11, Baltimore, MD, USA, 2006.
-
(2006)
Proceedings of IEEE Securecomm
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
17
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA. ACM
-
Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 199-212, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
19
-
-
53149124069
-
Approximate covering detection among content-based subscriptions using space filling curves
-
Washington, DC, USA, IEEE Computer Society
-
Zhenhui Shen and Srikanta Tirthapura. Approximate covering detection among content-based subscriptions using space filling curves. In Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS '07, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
Proceedings of the 27th International Conference on Distributed Computing Systems, ICDCS '07
-
-
Shen, Z.1
Tirthapura, S.2
-
20
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
volume 297 of IFIP Advances in Information and Communication Technology, Springer Boston
-
Abdullatif Shikfa, Melek Önen, and Refik Molva. Privacy-preserving content-based publish/subscribe networks. In Emerging Challenges for Security, Privacy and Trust, volume 297 of IFIP Advances in Information and Communication Technology, pages 270-282. Springer Boston, 2009.
-
(2009)
Emerging Challenges for Security, Privacy and Trust
, pp. 270-282
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
21
-
-
79961188847
-
Broker-based private matching
-
Berlin, Heidelberg. Springer-Verlag
-
Abdullatif Shikfa, Melek Önen, and Refik Molva. Broker-based private matching. In Proceedings of the 11th international conference on Privacy enhancing technologies, PETS'11, pages 264-284, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 11th International Conference on Privacy Enhancing Technologies, PETS'11
, pp. 264-284
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
22
-
-
80955143542
-
All your clouds are belong to us: Security analysis of cloud management interfaces
-
New York, NY, USA. ACM
-
Juraj Somorovsky, Mario Heiderich, Meiko Jensen, Jörg Schwenk, Nils Gruschka, and Luigi Lo Iacono. All your clouds are belong to us: security analysis of cloud management interfaces. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW '11, pages 3-14, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, CCSW '11
, pp. 3-14
-
-
Somorovsky, J.1
Heiderich, M.2
Jensen, M.3
Schwenk, J.4
Gruschka, N.5
Iacono, L.L.6
-
23
-
-
70849131456
-
Secure KNN computation on encrypted databases
-
New York, NY, USA, ACM
-
Wai Kit Wong, David Wai-lok Cheung, Ben Kao, and Nikos Mamoulis. Secure knn computation on encrypted databases. In Proceedings of the 35th SIGMOD international conference on Management of data, SIGMOD '09, pages 139-152, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 35th SIGMOD International Conference on Management of Data, SIGMOD '09
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.-L.2
Kao, B.3
Mamoulis, N.4
|