-
1
-
-
79952501372
-
(If) size matters: Sizehiding private set intersection
-
In: D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi (eds.), vol. 6571 of Lecture Notes in Computer Science, Taormina, Italy, March 6-9. Springer, Germany, Berlin
-
Ateniese, G., De Cristofaro, E., Tsudik, G.: (If) size matters: Sizehiding private set intersection. In: D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi (eds.) PKC 2011: 14th International Workshop on Theory and Practice in Public Key Cryptography, vol. 6571 of Lecture Notes in Computer Science, pp. 156-173. Taormina, Italy, March 6-9. Springer, Germany, Berlin (2011)
-
(2011)
PKC 2011: 14th International Workshop On Theory and Practice In Public Key Cryptography
, pp. 156-173
-
-
Ateniese, G.1
de Cristofaro, E.2
Tsudik, G.3
-
3
-
-
84872619729
-
-
Chapman, P., Evans, D., Huang, Y., Koo, S.: Common Contacts-Privacy-preserving shared contact computation. http://www. mightbeevil.com/contacts/
-
Common Contacts-Privacy-preserving Shared Contact Computation
-
-
Chapman, P.1
Evans, D.2
Huang, Y.3
Koo, S.4
-
4
-
-
74049164714
-
Common friends discovery with privacy and authenticity
-
IEEE Computer Society
-
Chiou, S.-Y., Chang, S.-Y., Sun, H.-M.: Common friends discovery with privacy and authenticity. In: IAS, pp. 337-340. IEEE Computer Society (2009)
-
(2009)
IAS
, pp. 337-340
-
-
Chiou, S.-Y.1
Chang, S.-Y.2
Sun, H.-M.3
-
5
-
-
68949136946
-
Efficient robust private set intersection
-
In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), vol. 5536 of Lecture Notes in Computer Science, ParisRocquencourt, France, June 2-5. Springer, Germany, Berlin
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 09: 7th International Conference on Applied Cryptography and Network Security, vol. 5536 of Lecture Notes in Computer Science, pp. 125-142. ParisRocquencourt, France, June 2-5. Springer, Germany, Berlin (2009)
-
(2009)
ACNS 09: 7th International Conference On Applied Cryptography and Network Security
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
6
-
-
11244267013
-
-
Springer, Berlin
-
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Berlin (2004)
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
7
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
In: Abe, M. (ed.), vol. 6477 of Lecture Notes in Computer Science, pp. 213-231. Singapore, December 5-9. Springer, Germany, Berlin
-
De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) Advances in Cryptology-ASIACRYPT, vol. 6477 of Lecture Notes in Computer Science, pp. 213-231. Singapore, December 5-9. Springer, Germany, Berlin (2010)
-
(2010)
Advances In Cryptology-ASIACRYPT
-
-
de Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
8
-
-
79959302160
-
Private discovery of common social contacts
-
In: Lopez, J., Tsudik, G. (eds.), vol. 6715 of Lecture Notesin Computer Science, pp. 147-165, Nerja, Spain, June 7-10. Springer, Germany, Berlin
-
De Cristofaro, E., Manulis, M., Poettering, B.: Private discovery of common social contacts. In: Lopez, J., Tsudik, G. (eds.) ACNS 11: 9th International Conference on Applied Cryptography and Network Security, vol. 6715 of Lecture Notesin Computer Science, pp. 147-165, Nerja, Spain, June 7-10. Springer, Germany, Berlin (2011)
-
(2011)
ACNS 11: 9th International Conference On Applied Cryptography and Network Security
-
-
de Cristofaro, E.1
Manulis, M.2
Poettering, B.3
-
9
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
In: Sion, R. (ed.), vol. 6052 of Lecture Notes in Computer Science, Tenerife, Canary Islands, Spain, January 25-28. Springer, Germany, Berlin
-
De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.), FC 2010: 14th International Conference on Financial Cryptography and Data Security, vol. 6052 of Lecture Notes in Computer Science, pp. 143-159. Tenerife, Canary Islands, Spain, January 25-28. Springer, Germany, Berlin (2010)
-
(2010)
FC 2010: 14th International Conference On Financial Cryptography and Data Security
, pp. 143-159
-
-
de Cristofaro, E.1
Tsudik, G.2
-
10
-
-
69949150672
-
Privacypreserving policy-based information transfer
-
In: Goldberg, I., Atallah, M.J. (eds.), vol. 5672 of Lecture Notes in Computer Science, Springer, Berlin
-
De Cristofaro, E., Jarecki, S., Kim, J., Tsudik, G.: Privacypreserving policy-based information transfer. In: Goldberg, I., Atallah, M.J. (eds.) Privacy Enhancing Technologies, vol. 5672 of Lecture Notes in Computer Science, pp. 164-184. Springer, Berlin (2009)
-
(2009)
Privacy Enhancing Technologies
, pp. 164-184
-
-
de Cristofaro, E.1
Jarecki, S.2
Kim, J.3
Tsudik, G.4
-
11
-
-
36348952601
-
Relationship identification for social network discovery
-
AAAI Press
-
Diehl, C.P., Namata, G., Getoor, L.: Relationship identification for social network discovery. In: AAAI, pp. 546-552. AAAI Press (2007)
-
(2007)
AAAI
, pp. 546-552
-
-
Diehl, C.P.1
Namata, G.2
Getoor, L.3
-
12
-
-
0024665726
-
Key distribution system based on identification information
-
Okamoto, E., Tanaka, K.: Key distribution system based on identification information. IEEE J. Sel. Areas Commun. 7(4), 481-485 (1989)
-
(1989)
IEEE J. Sel. Areas Commun
, vol.7
, Issue.4
, pp. 481-485
-
-
Okamoto, E.1
Tanaka, K.2
-
14
-
-
84872604662
-
-
Free Software Foundation. The GNU MP Bignum Library
-
Free Software Foundation. The GNU MP Bignum Library. http://gmplib.org/
-
-
-
-
16
-
-
35048820609
-
Efficient private matching and set intersection
-
In: Cachin, C., Camenisch, J. (eds.), vol. 3027 of Lecture Notes in Computer Science, pp. 1-19. Interlaken, Switzerland, May 2-6. Springer, Germany, Berlin
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J. (eds.) Advances in Cryptology-EUROCRYPT 2004, vol. 3027 of Lecture Notes in Computer Science, pp. 1-19. Interlaken, Switzerland, May 2-6. Springer, Germany, Berlin (2004)
-
(2004)
Advances In Cryptology-EUROCRYPT 2004
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
17
-
-
84872595801
-
-
Cryptology ePrint Archive, Report 2010/068
-
Gennaro, R., Krawczyk, H., Rabin, T.: Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead. Cryptology ePrint Archive, Report 2010/068, 2010. http://eprint.iacr.org/2010/068.pdf
-
(2010)
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman With Minimal Overhead
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
18
-
-
79956318444
-
Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead
-
In: Zhou, J., Yung, M. (eds.), vol. 6123 of Lecture Notes in Computer Science, pp. 309-328, Beijing, China, June 22-25. Springer, Germany, Berlin
-
Gennaro, R., Krawczyk, H., Rabin, T.: Okamoto-Tanaka revisited: Fully authenticated Diffie-Hellman with minimal overhead. In: Zhou, J., Yung, M. (eds.) ACNS 10: 8th International Conference on Applied Cryptography and Network Security, vol. 6123 of Lecture Notes in Computer Science, pp. 309-328, Beijing, China, June 22-25. Springer, Germany, Berlin (2010)
-
(2010)
ACNS 10: 8th International Conference On Applied Cryptography and Network Security
-
-
Gennaro, R.1
Krawczyk, H.2
Rabin, T.3
-
19
-
-
84872603899
-
-
Google Inc
-
Google Inc. Google+. http://plus.google.com
-
Google+
-
-
-
20
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
In: Canetti, R. (ed.), vol. 4948 of Lecture Notes in Computer Science, San Francisco, CA, USA, March 19-21. Springer, Germany, Berlin
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008: 5th Theory of Cryptography Conference, vol. 4948 of Lecture Notes in Computer Science, pp. 155-175. San Francisco, CA, USA, March 19-21. Springer, Germany, Berlin (2008)
-
(2008)
TCC 2008: 5th Theory of Cryptography Conference
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
21
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
In: Nguyen, P.Q., Pointcheval, D. (eds.), vol. 6056 of Lecture Notes in Computer Science, Paris, France, May 26-28. Springer, Germany, Berlin
-
Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010: 13th International Conference on Theory and Practice of Public Key Cryptography, vol. 6056 of Lecture Notes in Computer Science, pp. 312-331. Paris, France, May 26-28. Springer, Germany, Berlin (2010)
-
(2010)
PKC 2010: 13th International Conference On Theory and Practice of Public Key Cryptography
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
22
-
-
84868249595
-
Privacy-preserving applications on smartphones
-
Huang, Y., Chapman, P., Evans, D.: Privacy-preserving applications on smartphones. In: 6th USENIX Workshop on Hot Topics in, Security (2011)
-
(2011)
6th USENIX Workshop On Hot Topics In, Security
-
-
Huang, Y.1
Chapman, P.2
Evans, D.3
-
23
-
-
43149110632
-
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
-
In: Tal M. (ed.), vol. 4964 of Lecture Notes in Computer Science, San Francisco, CA, USA, April 7-11. Springer, Germany, Berlin
-
Jarecki, S., Kim, J., Tsudik, G.: Beyond secret handshakes: Affiliation-hiding authenticated key exchange. In: Tal M. (ed.), Topics in Cryptology-CT-RSA 2008, vol. 4964 of Lecture Notes in Computer Science, pp. 352-369. San Francisco, CA, USA, April 7-11. Springer, Germany, Berlin (2008)
-
(2008)
Topics In Cryptology-CT-RSA 2008
, pp. 352-369
-
-
Jarecki, S.1
Kim, J.2
Tsudik, G.3
-
24
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
In: Reingold, O. (ed.), vol. 5444 of Lecture Notes in Computer Science, Springer, Berlin, Germany, March
-
Jarecki, S., Liu, X.: Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In: Reingold, O. (ed.) TCC 2009: 6th Theory of Cryptography Conference, vol. 5444 of Lecture Notes in Computer Science, pp. 577-594. Springer, Berlin, Germany, March 15-17, 2009
-
(2009)
TCC 2009: 6th Theory of Cryptography Conference
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
25
-
-
77958056561
-
Fast secure computation of set intersection
-
In: Garay, J.A., De Prisco, R. (eds.), vol. 6280 of Lecture Notes in Computer Science, Amalfi, Italy, September 13-15. Springer, Germany, Berlin
-
Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 10: 7th International Conference on Security in Communication Networks, vol. 6280 of Lecture Notes in Computer Science, pp. 418-435. Amalfi, Italy, September 13-15. Springer, Germany, Berlin (2010)
-
(2010)
SCN 10: 7th International Conference On Security In Communication Networks
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
26
-
-
33745160750
-
Privacy-preserving set operations
-
In: Shoup, V. (ed.), vol. 3621 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 14-18. Springer, Germany, Berlin
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) Advances in Cryptology-CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 241-257, Santa Barbara, CA, USA, August 14-18. Springer, Germany, Berlin (2005)
-
(2005)
Advances In Cryptology-CRYPTO 2005
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
27
-
-
52649105864
-
Link privacy in social networks
-
IEEE
-
Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: ICDE, pp. 1355-1357. IEEE (2008)
-
(2008)
ICDE
, pp. 1355-1357
-
-
Korolova, A.1
Motwani, R.2
Nabar, S.U.3
Xu, Y.4
-
28
-
-
70349248583
-
Link privacy in social networks
-
Shanahan, J.G., Amer-Yahia, S., Manolescu, I., Zhang, Y., Evans, D.A., Kolcz, A., Choi, K.-S., Chowdhury, A. (eds.), ACM
-
Korolova, A., Motwani, R., Nabar, S.U., Xu, Y.: Link privacy in social networks. In: Shanahan, J.G., Amer-Yahia, S., Manolescu, I., Zhang, Y., Evans, D.A., Kolcz, A., Choi, K.-S., Chowdhury, A. (eds.) CIKM, pp. 289-298. ACM (2008)
-
(2008)
CIKM
, pp. 289-298
-
-
Korolova, A.1
Motwani, R.2
Nabar, S.U.3
Xu, Y.4
-
29
-
-
35248816546
-
SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols
-
In: Boneh, D. (ed.), vol. 2729 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 17-21. Springer. Germany, Berlin
-
Krawczyk, H.: SIGMA: The "SIGn-and-MAc" approach to authenticated Diffie-Hellman and its use in the IKE protocols. In: Boneh, D. (ed.), Advances in Cryptology-CRYPTO 2003, vol. 2729 of Lecture Notes in Computer Science, pp. 400-425, Santa Barbara, CA, USA, August 17-21. Springer. Germany, Berlin (2003)
-
(2003)
Advances In Cryptology-CRYPTO 2003
, pp. 400-425
-
-
Krawczyk, H.1
-
30
-
-
84872612366
-
-
LinkedIn. Press center about us, July 2012
-
LinkedIn. Press center about us. http://press.linkedin.com/about, July 2012
-
-
-
-
31
-
-
79956319602
-
Privacy-preserving group discovery with linear complexity
-
In: Zhou, J., Yung, M. (eds.), vol. 6123 of Lecture Notes in Computer Science, Beijing, China, June 22-25. Springer, Germany, Berlin
-
Manulis, M., Pinkas, B., Poettering, B.: Privacy-preserving group discovery with linear complexity. In: Zhou, J., Yung, M. (eds.) ACNS 10: 8th International Conference on Applied Cryptography and Network Security, vol. 6123 of Lecture Notes in Computer Science, pp. 420-437, Beijing, China, June 22-25. Springer, Germany, Berlin (2010)
-
(2010)
ACNS 10: 8th International Conference On Applied Cryptography and Network Security
, pp. 420-437
-
-
Manulis, M.1
Pinkas, B.2
Poettering, B.3
-
32
-
-
77955440831
-
Taming big brother ambitions: More privacy for secret handshakes
-
Atallah, M.J., Hopper, N.J. (eds), vol. 6205 of Lecture Notes in Computer Science, Springer
-
Manulis, M., Poettering, B., Tsudik, G.: Taming big brother ambitions: More privacy for secret handshakes. In Atallah, M.J., Hopper, N.J. (eds) Privacy Enhancing Technologies, vol. 6205 of Lecture Notes in Computer Science, pp. 149-165. Springer (2010)
-
(2010)
Privacy Enhancing Technologies
, pp. 149-165
-
-
Manulis, M.1
Poettering, B.2
Tsudik, G.3
-
33
-
-
79956049882
-
Practical affiliation-hiding authentication from improved polynomial interpolation
-
Manulis, M., Poettering, B.: Practical affiliation-hiding authentication from improved polynomial interpolation. In: ASIACCS, pp. 286-295 (2011)
-
(2011)
ASIACCS
, pp. 286-295
-
-
Manulis, M.1
Poettering, B.2
-
35
-
-
17444362761
-
On the security of modular exponentiation with application to the construction of pseudorandom generators
-
Goldreich, O., Rosen, V.: On the security of modular exponentiation with application to the construction of pseudorandom generators. J. Cryptol. 16(2), 71-93 (2003)
-
(2003)
J. Cryptol
, vol.16
, Issue.2
, pp. 71-93
-
-
Goldreich, O.1
Rosen, V.2
-
36
-
-
84964242030
-
Key distribution systems based on identification information
-
In: Pomerance, C. (ed.), vol. 293 of Lecture Notes in Computer Science, Santa Barbara, CA, USA, August 16-20. Springer, Germany, Berlin
-
Okamoto, E.: Key distribution systems based on identification information. In: Pomerance, C. (ed.) Advances in CryptologyCRYPTO'87, vol. 293 of Lecture Notes in Computer Science, pp. 194-202, Santa Barbara, CA, USA, August 16-20. Springer, Germany, Berlin (1988)
-
(1988)
Advances In CryptologyCRYPTO'87
, pp. 194-202
-
-
Okamoto, E.1
-
37
-
-
38849162343
-
Computing communities in large networks using random walks
-
Pons, P., Latapy, M.: Computing communities in large networks using random walks. J. Graph Algorithms Appl. 10(2), 191-218 (2006)
-
(2006)
J. Graph Algorithms Appl
, vol.10
, Issue.2
, pp. 191-218
-
-
Pons, P.1
Latapy, M.2
-
39
-
-
56749173469
-
Veneta: Serverless friend-of-friend detection in mobile social networking
-
IEEE
-
von Arb, M., Bader, M., Kuhn, M., Wattenhofer, R.: Veneta: Serverless friend-of-friend detection in mobile social networking. In: WiMob, pp. 184-189. IEEE (2008)
-
(2008)
WiMob
, pp. 184-189
-
-
von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
40
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
IEEE Computer Society
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE Computer Society (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
-
41
-
-
84919835260
-
-
Springer, Berlin
-
Yu, P.S., Han, J., Faloutsos, C.: Link Mining: Models, Algorithms, and Applications. Springer, Berlin (2010)
-
(2010)
Link Mining: Models, Algorithms, and Applications
-
-
Yu, P.S.1
Han, J.2
Faloutsos, C.3
-
42
-
-
79960914914
-
Using friendship ties and family circles for link prediction
-
Giles, C.L., Smith, M., Yen, J., Zhang, H. (eds.), vol. 5498 of Lecture Notes in Computer Science, Springer
-
Zhelevam, E., Getoor, L., Golbeck, J., Kuter, U.: Using friendship ties and family circles for link prediction. In: Giles, C.L., Smith, M., Yen, J., Zhang, H. (eds.) SNAKDD, vol. 5498 of Lecture Notes in Computer Science, pp. 97-113. Springer (2008)
-
(2008)
SNAKDD
, pp. 97-113
-
-
Zhelevam, E.1
Getoor, L.2
Golbeck, J.3
Kuter, U.4
|