-
1
-
-
70349581237
-
Integrated health care economics. Part 2: Understanding the revenue drivers in fully integrated community health systems
-
D. Zismer, J. McCullough, and P. Person, "Integrated health care economics. part 2: Understanding the revenue drivers in fully integrated community health systems." Physician Exec, vol. 35, no. 4, pp. 26-8, 2011.
-
(2011)
Physician Exec
, vol.35
, Issue.4
, pp. 26-28
-
-
Zismer, D.1
McCullough, J.2
Person, P.3
-
2
-
-
79960878565
-
Findu: Privacy-preserving personal profile matching in mobile social networks
-
Apr.
-
M. Li, N. Cao, S. Yu, and W. Lou, "Findu: Privacy-preserving personal profile matching in mobile social networks," INFOCOM 2011. The 30th Conference on Computer Communications. IEEE, pp. 2435-2443, Apr. 2011.
-
(2011)
INFOCOM 2011. The 30th Conference on Computer Communications. IEEE
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
3
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
Apr.
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," INFOCOM 2011. The 30th Conference on Computer Communications. IEEE, pp. 1647-1655, Apr. 2011.
-
(2011)
INFOCOM 2011. The 30th Conference on Computer Communications. IEEE
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
4
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
Mar.
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking," INFOCOM 2012. 31th IEEE International Conference on Computer Communications. IEEE, pp. 1 -9, Mar. 2012.
-
(2012)
INFOCOM 2012. 31th IEEE International Conference on Computer Communications. IEEE
, pp. 1-9
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
5
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," Proceedings of the 2003 ACM SIGMOD International Conference on Management of data, pp. 86-97, 2003. [Online]. Available: http://doi.acm.org/10.1145/872757.872771
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
6
-
-
0030150177
-
Comparing information without leaking it
-
May
-
R. Fagin, M. Naor, and P. Winkler, "Comparing information without leaking it," Commun. ACM, vol. 39, pp. 77-85, May 1996. [Online]. Available: http://doi.acm.org/10.1145/229459.229469
-
(1996)
Commun. ACM
, vol.39
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
8
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
M. Blum, P. Feldman, and S. Micali, "Non-interactive zero-knowledge and its applications," Proceedings of the twentieth annual ACM symposium on Theory of computing STOC'88, pp. 103-112, 1988. [Online]. Available: http://doi.acm.org/10.1145/62212.62222
-
(1988)
Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing STOC'88
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
12
-
-
77957925235
-
Noninteractive anonymous credentials
-
M. Belenkiy, M.Chase, M. Kohlweiss, and A. Lysyanskaya, "Noninteractive anonymous credentials," Cryptology ePrint Archive, Report 2007/384, 2007, http://eprint.iacr.org/.
-
(2007)
Cryptology EPrint Archive, Report 2007/384
-
-
Belenkiy, M.1
Chase, M.2
Kohlweiss, M.3
Lysyanskaya, A.4
-
13
-
-
84866889971
-
PAAS: Privacy-preserving attribute-based authentication system for ehealth networks
-
Macau, China: IEEE
-
L. Guo, C. Zhang, J. Sun, and Y. Fang, "PAAS: Privacy-preserving attribute-based authentication system for ehealth networks," in The 32nd IEEE International Conference on Distributed Computing Systems, ser. ICDCS 2012. Macau, China: IEEE, 2012.
-
(2012)
The 32nd IEEE International Conference on Distributed Computing Systems, Ser. ICDCS 2012
-
-
Guo, L.1
Zhang, C.2
Sun, J.3
Fang, Y.4
-
15
-
-
38149009170
-
Short signatures without random oracles and the sdh assumption in bilinear groups
-
D. Boneh and X. Boyen, "Short signatures without random oracles and the sdh assumption in bilinear groups," Journal of Cryptology, vol. 21, no. 2, pp. 149-177, 2008.
-
(2008)
Journal of Cryptology
, vol.21
, Issue.2
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
16
-
-
30744458170
-
Alternatives to nonmalleability: Definitions, constructions, and applications (extended abstract)
-
P. MacKenzie, M. K. Reiter, and K. Yang, "Alternatives to nonmalleability: Definitions, constructions, and applications (extended abstract)," In proceedings of TCC '04, LNCS, pp. 171-190, 2004.
-
(2004)
Proceedings of TCC '04, LNCS
, pp. 171-190
-
-
MacKenzie, P.1
Reiter, M.K.2
Yang, K.3
-
17
-
-
85075489334
-
Privacypreserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacypreserving aggregation of time-series data," NDSS 2011, 2011.
-
(2011)
NDSS 2011
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
|