-
1
-
-
77951187028
-
-
Gsmworld -market data summary (2009), http://www.gsmworld.com/newsroom/ market-data/market data summary.html
-
(2009)
Gsmworld -Market Data Summary
-
-
-
4
-
-
18744416146
-
-
3GPP. TS 04.08, 3rd Generation Partnership Project (3GPP) January
-
3GPP. Mobile radio interface layer 3 specification. TS 04.08, 3rd Generation Partnership Project (3GPP) (January 2004)
-
(2004)
Mobile Radio Interface Layer 3 Specification
-
-
-
5
-
-
84862167734
-
-
3GPP. TS 23.002, 3rd Generation Partnership Project (3GPP) March
-
3GPP. Network architecture. TS 23.002, 3rd Generation Partnership Project (3GPP) (March 2011)
-
(2011)
Network Architecture
-
-
-
6
-
-
84958035648
-
Secure Multi-party Computational Geometry
-
Dehne, F., Sack, J.- R., Tamassia, R. (eds.) WADS 2001. Springer, Heidelberg
-
Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.- R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165-179. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2125
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
7
-
-
2942524994
-
-
Piscataway, NJ, USA, IEEE Educational Activities Department (January)
-
Beresford, A.R., Stajano, F.: Location privacy in pervasive computing, Piscataway, NJ, USA, vol. 2, pp. 46-55. IEEE Educational Activities Department (January 2003)
-
(2003)
Location Privacy in Pervasive Computing
, vol.2
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
8
-
-
79956075292
-
Identifying and Filtering Near-Duplicate Documents
-
Giancarlo, R., Sankoff, D. (eds.) CPM 2000. Springer, Heidelberg
-
Broder, A.: Identifying and Filtering Near-Duplicate Documents. In: Giancarlo, R., Sankoff, D. (eds.) CPM 2000. LNCS, vol. 1848, pp. 1-10. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1848
, pp. 1-10
-
-
Broder, A.1
-
9
-
-
0010362121
-
Syntactic clustering of the web
-
Papers from the Sixth International World Wide Web Conference
-
Broder, A.Z., Glassman, S.C., Manasse, M.S., Zweig, G.: Syntactic clustering of the web. Computer Networks and ISDN Systems 29(8-13), 1157-1166 (1997); Papers from the Sixth International World Wide Web Conference
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 1157-1166
-
-
Broder, A.Z.1
Glassman, S.C.2
Manasse, M.S.3
Zweig, G.4
-
10
-
-
77955318017
-
Practical Private Set Intersection Protocols with Linear Complexity
-
Sion,R. (ed.) FC2010. Springer,Heidelberg
-
De Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Complexity. In: Sion,R. (ed.) FC2010.LNCS, vol. 6052, pp. 143-159. Springer,Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
12
-
-
0030150177
-
Comparing information without leaking it
-
Fagin, R., Naor, M.,Winkler, P.: Comparing information without leaking it. Commun. ACM, 77-85 (1996)
-
(1996)
Commun. ACM
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
13
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM, New York
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003, pp. 31-42. ACM, New York (2003)
-
(2003)
Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys 2003
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
15
-
-
40249108370
-
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
16
-
-
79955547393
-
Efficient Set Operations in the Presence of Malicious Adversaries
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
18
-
-
0001368373
-
Étude comparative de la distribution florale dans une portion des Alpes et des Jura
-
Jaccard, P.: Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Société Vaudoise des Sciences Naturelles 37, 547-579 (1901)
-
(1901)
Bulletin del la Société Vaudoise des Sciences Naturelles
, vol.37
, pp. 547-579
-
-
Jaccard, P.1
-
19
-
-
70350656283
-
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
20
-
-
77958056561
-
Fast Secure Computation of Set Intersection
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Fast Secure Computation of Set Intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
21
-
-
33745160750
-
Privacy-Preserving Set Operations
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
22
-
-
85150485002
-
Location privacy via private proximity testing
-
Internet Society (February)
-
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: Network and Distributed System Security Symposium. Internet Society (February 2011)
-
(2011)
Network and Distributed System Security Symposium
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
23
-
-
34547980841
-
Geoencryption using loran
-
Qiu, D., Lo, S., Enge, P., Boneh, D., Peterson, B.: Geoencryption using loran. The Institute of Navigation International Technical Meeting (2007)
-
(2007)
The Institute of Navigation International Technical Meeting
-
-
Qiu, D.1
Lo, S.2
Enge, P.3
Boneh, D.4
Peterson, B.5
-
24
-
-
78650182778
-
Unraveling an old cloak: K-anonymity for location privacy
-
ACM, New York
-
Shokri, R., Troncoso, C., Diaz, C., Freudiger, J., Hubaux, J.-P.: Unraveling an old cloak: k-anonymity for location privacy. In: Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2010, pp. 115-118. ACM, New York (2010)
-
(2010)
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES 2010
, pp. 115-118
-
-
Shokri, R.1
Troncoso, C.2
Diaz, C.3
Freudiger, J.4
Hubaux, J.-P.5
-
25
-
-
0037711698
-
Social net: Using patterns of physical proximity over time to infer shared interests
-
ACM, New York
-
Terry,M., Mynatt, E.D., Ryall, K., Leigh, D.: Social net: using patterns of physical proximity over time to infer shared interests. In: CHI 2002 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2002, pp. 816-817. ACM, New York (2002)
-
(2002)
CHI 2002 Extended Abstracts on Human Factors in Computing Systems, CHI EA 2002
, pp. 816-817
-
-
Terry, M.1
Mynatt, E.D.2
Ryall, K.3
Leigh, D.4
-
26
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society, Washington, DC
-
Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982, pp. 160-164. IEEE Computer Society, Washington, DC (1982)
-
(1982)
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS 1982
, pp. 160-164
-
-
Yao, A.C.1
-
27
-
-
38149079700
-
Louis, Lester and Pierre: Three Protocols for Location Privacy
-
Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
-
Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4776
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|