-
3
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
45749151381
-
Providing k-anonymity in data mining
-
Jul
-
A. Friedman, R. Wolff, and A. Schuster, "Providing k-anonymity in data mining," VLDB Journal, vol. 17, no. 4, pp. 789-804, Jul. 2008.
-
(2008)
VLDB Journal
, vol.17
, Issue.4
, pp. 789-804
-
-
Friedman, A.1
Wolff, R.2
Schuster, A.3
-
5
-
-
28044462690
-
SEAS, a secure e-voting protocol: Design and implementation
-
DOI 10.1016/j.cose.2005.07.008, PII S0167404805001100
-
F. Baiardi, A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A. Vaccarelli, "Seas, a secure e-voting protocol: Design and implementation," Comput. Security, vol. 24, no. 8, pp. 642-652, Nov. 2005. (Pubitemid 41690977)
-
(2005)
Computers and Security
, vol.24
, Issue.8
, pp. 642-652
-
-
Baiardi, F.1
Falleni, A.2
Granchi, R.3
Martinelli, F.4
Petrocchi, M.5
Vaccarelli, A.6
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable electronic mail, return address and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
7
-
-
80052099590
-
Privacy-preserving matchmaking for mobile social networking secure against malicious users
-
Jul.
-
Q. Xie and U. Hengartner, "Privacy-preserving matchmaking for mobile social networking secure against malicious users," in Proc. 9th Ann. IEEE Conf. Privacy, Security and Trust, Jul. 2011, pp. 252-259.
-
(2011)
Proc. 9th Ann. IEEE Conf. Privacy, Security and Trust
, pp. 252-259
-
-
Xie, Q.1
Hengartner, U.2
-
8
-
-
0023545076
-
How to play any mental game
-
Jan., ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game," in Proc. 19th Ann. ACM Conf. Theory of Computing, Jan. 1987, pp. 218-229, ACM Press.
-
(1987)
Proc. 19th Ann. ACM Conf. Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
10
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Dec
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 28-34, Dec. 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
11
-
-
33845565062
-
A collusion-resistant approach to privacy-preserving distributed data mining
-
J. Wang, T. Fukasama, S. Urabe, and T. Takata, "A collusion-resistant approach to privacy-preserving distributed data mining," IEICE Trans. Inf. Syst. (Inst. Electron. Inf. Commun. Eng.), vol. E89-D, no. 11, pp. 2739-2747, 2006.
-
(2006)
IEICE Trans. Inf. Syst. (Inst. Electron. Inf. Commun. Eng.)
, vol.E89-D
, Issue.11
, pp. 2739-2747
-
-
Wang, J.1
Fukasama, T.2
Urabe, S.3
Takata, T.4
-
12
-
-
0033101103
-
Distributing identity [symmetry breaking distributed access protocols]
-
Mar
-
J. Smith, "Distributing identity [symmetry breaking distributed access protocols]," IEEE Robot. Autom. Mag., vol. 6, no. 1, pp. 49-56, Mar. 1999.
-
(1999)
IEEE Robot. Autom. Mag.
, vol.6
, Issue.1
, pp. 49-56
-
-
Smith, J.1
-
13
-
-
65549142682
-
Privacy and anonymity protection in computational grid services
-
Jan
-
D. Jana, A. Chaudhuri, and B. B. Bhaumik, "Privacy and anonymity protection in computational grid services," Int. J. Comput. Sci. Applicat., vol. 6, no. 1, pp. 98-107, Jan. 2009.
-
(2009)
Int. J. Comput. Sci. Applicat.
, vol.6
, Issue.1
, pp. 98-107
-
-
Jana, D.1
Chaudhuri, A.2
Bhaumik, B.B.3
-
14
-
-
84955557456
-
Hiding routing information
-
Springer-Verlag
-
D. M. Goldschlag,M. G. Reed, and P. F. Syverson, "Hiding routing information," in Proc. Information Hiding, 1996, pp. 137-150, Springer- Verlag.
-
(1996)
Proc. Information Hiding
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
16
-
-
78651574285
-
Anonymous id assignment and opt-out
-
S. Ao and L. Gleman, Eds. New York: Springer
-
S. S. Shepard, R. Dong, R. Kresman, and L. Dunning, "Anonymous id assignment and opt-out," in Lecture Notes in Electrical Engineering, S. Ao and L. Gleman, Eds. New York: Springer, 2010, pp. 420-431.
-
(2010)
Lecture Notes in Electrical Engineering
, pp. 420-431
-
-
Shepard, S.S.1
Dong, R.2
Kresman, R.3
Dunning, L.4
-
17
-
-
84872742833
-
Secure statistical analysis of distributed databases, emphasizing what we don't know
-
A. Karr, "Secure statistical analysis of distributed databases, emphasizing what we don't know," J. Privacy Confidentiality, vol. 1, no. 2, pp. 197-211, 2009.
-
(2009)
J. Privacy Confidentiality
, vol.1
, Issue.2
, pp. 197-211
-
-
Karr, A.1
-
18
-
-
84944076702
-
Local and global properties in networks of processors (extended abstract)
-
New York
-
D.Angluin, "Local and global properties in networks of processors (extended abstract)," in Proc. 12th Ann. ACM Symp. Theory of Computing (STOC '80), New York, 1980, pp. 82-93.
-
(1980)
Proc. 12th Ann. ACM Symp. Theory of Computing (STOC '80)
, pp. 82-93
-
-
Angluin, D.1
-
19
-
-
33748801791
-
Variations on Itai-Rodeh leader election for anonymous rings and their analysis in PRISM
-
W. Fokkink and J. Pang, "Variations on itai-rodeh leader election for anonymous rings and their analysis in prism," J. Universal Comput. Sci., vol. 12, no. 8, pp. 981-1006, Aug. 2006. (Pubitemid 44413382)
-
(2006)
Journal of Universal Computer Science
, vol.12
, Issue.8
, pp. 981-1006
-
-
Fokkink, W.1
Pang, J.2
-
20
-
-
74349122124
-
A new collision-free pseudonym scheme in mobile ad hoc networks
-
Piscataway, NJ, IEEE Press.
-
J. W. Yoon and H. Kim, "A new collision-free pseudonym scheme in mobile ad hoc networks," in Proc. 7th Int. Conf. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT'09), Piscataway, NJ, 2009, pp. 376-380, IEEE Press.
-
(2009)
Proc. 7th Int. Conf. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT'09)
, pp. 376-380
-
-
Yoon, J.W.1
Kim, H.2
-
21
-
-
79959543812
-
A perfect collision-free pseudonym system
-
Jun.
-
J.W. Yoon and H. Kim, "A perfect collision-free pseudonym system," IEEE Commun. Lett., vol. 15, no. 6, pp. 686-688, Jun. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.6
, pp. 686-688
-
-
Yoon, J.W.1
Kim, H.2
-
23
-
-
33751085880
-
Privacy homomorphisms for E-gambling and mental poker
-
1635918, 2006 IEEE International Conference on Granular Computing
-
J. Castellà-Roca, V. Daza, J. Domingo-Ferrer, and F. Sebé, "Privacy homomorphisms for e-gambling and mental poker," in Proc. IEEE Int. Conf. Granular Computing, 2006, pp. 788-791. (Pubitemid 44762026)
-
(2006)
2006 IEEE International Conference on Granular Computing
, pp. 788-791
-
-
Castella-Roca, J.1
Daza, V.2
Domingo-Ferrer, J.3
Sebe, F.4
-
24
-
-
0000731055
-
Security and composition of multi-party cryptographic protocols
-
R. Canetti, "Security and composition of multi-party cryptographic protocols," J. Cryptol., vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
J. Cryptol.
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
25
-
-
35248845362
-
Secure multi-party computation made simple
-
Berlin, Heidelberg, Springer-Verlag.
-
U. Maurer, "Secure multi-party computation made simple," in Proc. 3rd Int. Conf. Security in Communication Networks (SCN'02), Berlin, Heidelberg, 2003, pp. 14-28, Springer-Verlag.
-
(2003)
Proc. 3rd Int. Conf. Security in Communication Networks (SCN'02)
, pp. 14-28
-
-
Maurer, U.1
-
28
-
-
33746082048
-
-
Berlin, Heidelberg: Springer, ch. 32
-
C. Crépeau, G. Savvides, C. Schaffner, and J. Wullschleger, Information- Theoretic Conditions for Two-Party Secure Function Evaluation, ser. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2006, vol. 4004, ch. 32, pp. 538-554.
-
(2006)
Information- Theoretic Conditions for Two-Party Secure Function Evaluation, Ser. Lecture Notes in Computer Science
, vol.4004
, pp. 538-554
-
-
Crépeau, C.1
Savvides, G.2
Schaffner, C.3
Wullschleger, J.4
-
29
-
-
11844299107
-
A collusion-resistant approach to distributed privacy-preserving data mining
-
439-088, Proceedings of the 16th IASTED International Conference on Parallel and Distributed Computing and Systems
-
S. Urabe, J. Wang, and T. Takata, "A collusion-resistant approach to distributed privacy-preserving data mining," in Parallel and Distributed Computing and Systems, T. Gonzalez, Ed. MIT Cambridge: ACTA Press, Nov. 2004, vol. 436, no. 088, pp. 626-631. (Pubitemid 40088194)
-
(2004)
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Systems
, vol.16
, pp. 626-631
-
-
Urabe, S.1
Wang, J.2
Takata, T.3
-
30
-
-
0040891696
-
A proof of Newton's power sum formulas
-
Apr
-
J. A. Eidswick, "A proof of Newton's power sum formulas," Amer. Math. Monthly, vol. 75, no. 4, pp. 396-396, Apr. 1968.
-
(1968)
Amer. Math. Monthly
, vol.75
, Issue.4
, pp. 396-396
-
-
Eidswick, J.A.1
-
31
-
-
21144482709
-
Newton's identities
-
Oct
-
D. G. Mead, "Newton's identities," Amer. Math. Monthly, vol. 99, no. 8, pp. 749-749, Oct. 1992.
-
(1992)
Amer. Math. Monthly
, vol.99
, Issue.8
, pp. 749-749
-
-
Mead, D.G.1
-
34
-
-
60549110736
-
Chapter 11:Markov chains
-
2nd ed. Providence, RI: Amer. Math. Society
-
C. M. Grinstead and J. L. Snell, "Chapter 11:Markov chains," in Introduction to Probability, 2nd ed. Providence, RI: Amer. Math. Society, 1997, pp. 510-510.
-
(1997)
Introduction to Probability
, pp. 510-510
-
-
Grinstead, C.M.1
Snell, J.L.2
-
35
-
-
85012865275
-
Bounds for transient characteristics of Markov chains with large or infinite state spaces
-
Raleigh, NC, Jan. 8-10, 1990, Numerical Solution ofMarkov Chains, W. J. Stewart, Ed. New York: Marcel Dekker
-
P.-J. Courtois and P. Semal, "Bounds for transient characteristics of Markov chains with large or infinite state spaces," in Proc. First Int. Conf. Numerical Solutions of Markov Chains, Raleigh, NC, Jan. 8-10, 1990, Numerical Solution ofMarkov Chains, W. J. Stewart, Ed. New York: Marcel Dekker, 1991, pp. 413-434.
-
(1991)
Proc. First Int. Conf. Numerical Solutions of Markov Chains
, pp. 413-434
-
-
Courtois, P.-J.1
Semal, P.2
-
36
-
-
0003687683
-
-
Translated From the Russian by E. Seneta. Groningen: Wolters-Noordhoff
-
V. I. Romanovskii, DiscreteMarkov Chains. Translated From the Russian by E. Seneta. Groningen: Wolters-Noordhoff, 1970.
-
(1970)
DiscreteMarkov Chains
-
-
Romanovskii, V.I.1
-
37
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Berlin, Heidelberg, Springer-Verlag.
-
T. P. Pedersen, "A threshold cryptosystem without a trusted party," in Proc. 10th Ann. Int. Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT'91), Berlin, Heidelberg, 1991, pp. 522-526, Springer-Verlag.
-
(1991)
Proc. 10th Ann. Int. Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT'91)
, pp. 522-526
-
-
Pedersen, T.P.1
-
38
-
-
84958626761
-
Deniable encryption
-
Advances in Cryptology - CRYPTO '97
-
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, "Deniable encryption," in CRYPTO, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed. New York: Springer, 1997, vol. 1294, pp. 90-104. (Pubitemid 127112546)
-
(1997)
Lecture notes in computer science
, Issue.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
39
-
-
84968518238
-
Factoring polynomials over large finite fields
-
Sep
-
E. R. Berlekamp, "Factoring polynomials over large finite fields," Math. Computat., vol. 24, no. 111, pp. 713-713, Sep. 1970.
-
(1970)
Math. Computat.
, vol.24
, Issue.111
, pp. 713-713
-
-
Berlekamp, E.R.1
-
40
-
-
84966220369
-
A new algorithm for factoring polynomials over finite fields
-
May
-
D. G. Cantor and H. Zassenhaus, "A new algorithm for factoring polynomials over finite fields," Math. Computat., vol. 36, no. 154, pp. 587-592, May 1981.
-
(1981)
Math. Computat.
, vol.36
, Issue.154
, pp. 587-592
-
-
Cantor, D.G.1
Zassenhaus, H.2
|