-
1
-
-
0036195374
-
Personal health records on the Internet: a snapshot of the pioneers at the end of the 20th century
-
Sittig DF. Personal health records on the Internet: a snapshot of the pioneers at the end of the 20th century. International Journal of Medical Informatics 2002; 65(1): 1-6.
-
(2002)
International Journal of Medical Informatics
, vol.65
, Issue.1
, pp. 1-6
-
-
Sittig, D.F.1
-
2
-
-
84870994444
-
-
Google Inc. Google Health.Mountain View, USA.
-
Google Inc. Google Health. http://www.google.com/intl/nl/health/about/. Mountain View, USA.
-
-
-
-
3
-
-
84871023270
-
-
Microsoft Corporation. Microsoft HealthVault
-
Microsoft Corporation. Microsoft HealthVault. http://www.healthvault.com/personal/index.aspx
-
-
-
-
4
-
-
84871001844
-
-
Cloud Security Alliance. Top threat to cloud computing V1.0. Seattle, USA.
-
Cloud Security Alliance. Top threat to cloud computing V1.0. http://www.cloudsecurityalliance.org/topthreats.html. Seattle, USA.
-
-
-
-
5
-
-
77952046408
-
Probabilistic public key encryption with equality test
-
of LNCS, Pieprzyk J (ed). Springer: Berlin
-
Yang G, Tan C, Huang Q, Wong DS. Probabilistic public key encryption with equality test. In Topics in Cryptology-CT-RSA 2010, Vol. 5985 of LNCS, Pieprzyk J (ed). Springer: Berlin, 2010; 119-131.
-
(2010)
Topics in Cryptology-CT-RSA 2010
, vol.5985
, pp. 119-131
-
-
Yang, G.1
Tan, C.2
Huang, Q.3
Wong, D.S.4
-
6
-
-
79960259675
-
Towards public key encryption scheme supporting equality test with fine-grained authorization
-
of LNCS. Springer: Berlin
-
Tang Q. Towards public key encryption scheme supporting equality test with fine-grained authorization. In Proceedings of the 16th Australasian Conference on Information Security and Privacy, Vol. 6812 of LNCS. Springer: Berlin, 2011; 389-406.
-
(2011)
Proceedings of the 16th Australasian Conference on Information Security and Privacy
, vol.6812
, pp. 389-406
-
-
Tang, Q.1
-
7
-
-
84870223790
-
-
Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, Massachusetts Institute of Technology, Cambridge, USA
-
Rivest RL, Shamir A, Wagner DA. Time-lock puzzles and timed-release crypto. Technical Report MIT/LCS/TR-684, Massachusetts Institute of Technology, Cambridge, USA, 1996.
-
(1996)
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
8
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
of LNCS, Krawczyk H (ed). Springer: Berlin
-
Bellare M, Desai A, Pointcheval D, Rogaway P. Relations among notions of security for public-key encryption schemes. In Advances in Cryptology-CRYPTO 1998, Vol. 1462 of LNCS, Krawczyk H (ed). Springer: Berlin, 1998; 26-45.
-
(1998)
Advances in Cryptology-CRYPTO 1998
, vol.1462
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
9
-
-
33750696320
-
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
-
of LNCS, Jonker W, Petkovic M (eds). Springer: Berlin
-
Byun JW, Rhee HS, Park H, Lee DH. Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. In Secure Data Management, Third VLDB Workshop, SDM 2006, Vol. 4165 of LNCS, Jonker W, Petkovic M (eds). Springer: Berlin, 2006; 75-83.
-
(2006)
Secure Data Management, Third VLDB Workshop, SDM 2006
, vol.4165
, pp. 75-83
-
-
Byun, J.W.1
Rhee, H.S.2
Park, H.3
Lee, D.H.4
-
12
-
-
84871021303
-
-
Sequences of games: a tool for taming complexity in security proofs, New York, USA.
-
Shoup V. Sequences of games: a tool for taming complexity in security proofs. http://shoup.net/papers/, New York, USA, 2006.
-
(2006)
-
-
Shoup, V.1
-
14
-
-
84871006631
-
-
On non-parallelizable deterministic client puzzle scheme with batch verification modes. Technical Report TR-CTIT-10-02, CTIT, University of Twente,
-
Tang Q, Jeckmans A. On non-parallelizable deterministic client puzzle scheme with batch verification modes. Technical Report TR-CTIT-10-02, CTIT, University of Twente, 2010. http://eprints.eemcs.utwente.nl/17107/
-
(2010)
-
-
Tang, Q.1
Jeckmans, A.2
-
15
-
-
84958639277
-
Efficient generation of shared rsa keys (extended abstract)
-
Springer
-
Boneh D, Franklin MK. Efficient generation of shared rsa keys (extended abstract). In Advances in Cryptology-CRYPTO 1997. Springer, 1997; 425-439.
-
(1997)
Advances in Cryptology-CRYPTO 1997
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.K.2
-
16
-
-
35048901123
-
Public key encryption with keyword search
-
of LNCS, Cachin C, Camenisch J (eds). Springer: Berlin
-
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G. Public key encryption with keyword search. In Advances in Cryptology-EUROCRYPT 2004, Vol. 3027 of LNCS, Cachin C, Camenisch J (eds). Springer: Berlin, 2004; 506-522.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
17
-
-
3142716056
-
Order preserving encryption for numeric data
-
ACM Press: New York, USA
-
Agrawal R, Kiernan J, Srikant R, Xu Y. Order preserving encryption for numeric data. In SIGMOD'04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM Press: New York, USA, 2004; 563-574.
-
(2004)
SIGMOD'04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
18
-
-
67650690965
-
Order-preserving symmetric encryption
-
of LNCS, Joux A (ed). Springer: Berlin
-
Boldyreva A, Chenette N, Lee Y, O'Neill A. Order-preserving symmetric encryption. In Advances in Cryptology-EUROCRYPT 2009, Vol. 5479 of LNCS, Joux A (ed). Springer: Berlin, 2009; 224-241.
-
(2009)
Advances in Cryptology-EUROCRYPT 2009
, vol.5479
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O'Neill, A.4
-
19
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
of LNCS, Nyberg K (ed). Springer: Berlin
-
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In Advances in Cryptology-EUROCRYPT 1998, Vol. 1403 of LNCS, Nyberg K (ed). Springer: Berlin, 1998; 127-144.
-
(1998)
Advances in Cryptology-EUROCRYPT 1998
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
22
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
of LNCS, Blakley GR, Chaum D (eds). Springer
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology-CRYPTO 1984, Vol. 196 of LNCS, Blakley GR, Chaum D (eds). Springer, 1985; 10-18.
-
(1985)
Advances in Cryptology-CRYPTO 1984
, vol.196
, pp. 10-18
-
-
ElGamal, T.1
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
of LNCS, Stern J (ed). Springer
-
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT 1999, Vol. 1592 of LNCS, Stern J (ed). Springer, 1999; 223-238.
-
(1999)
Advances in Cryptology-EUROCRYPT 1999
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Mitzenmacher M (ed). ACM Press: New York, USA
-
Gentry C. Fully homomorphic encryption using ideal lattices. In Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Mitzenmacher M (ed). ACM Press: New York, USA, 2009; 169-178.
-
(2009)
Proceedings of the 41st Annual ACM Symposium on Theory of Computing
, pp. 169-178
-
-
Gentry, C.1
-
25
-
-
38349070353
-
Generic combination of public key encryption with keyword search and public key encryption
-
of LNCS, Bao F, Ling S, Okamoto T, Wang H, Xing C (eds). Springer: Berlin
-
Zhang R, Imai H. Generic combination of public key encryption with keyword search and public key encryption. In Cryptology and Network Security, 6th International Conference, CANS 2007, Vol. 4856 of LNCS, Bao F, Ling S, Okamoto T, Wang H, Xing C (eds). Springer: Berlin, 2007; 159-174.
-
(2007)
Cryptology and Network Security, 6th International Conference, CANS 2007
, vol.4856
, pp. 159-174
-
-
Zhang, R.1
Imai, H.2
|