-
1
-
-
38049138213
-
Public Key Encryption That Allows PIR Queries
-
Menezes A, (ed), Springer
-
Boneh D, Kushilevitz E, Ostrovsky R, Skeith WE III: Public Key Encryption That Allows PIR Queries. In CRYPTO, Volume 4622 of Lecture Notes in Computer Science. Edited by: Menezes A. Springer; 2007:50–67.
-
(2007)
CRYPTO, Volume 4622 of Lecture Notes in Computer Science
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith, W.E.4
-
3
-
-
84887910300
-
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing
-
Li J, Wang Q, Wang C, Cao N, Ren K, Lou W: Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.Cryptology ePrint Archive, Report 2009/593 2009, 16.
-
(2009)
Cryptology ePrint Archive, Report 2009/593
, pp. 16
-
-
Li, J.1
Wang, Q.2
Wang, C.3
Cao, N.4
Ren, K.5
Lou, W.6
-
4
-
-
0036487317
-
The importance of being random: statistical principles of iris recognition
-
Daugman J: The importance of being random: statistical principles of iris recognition.Pattern Recognit 2003,36(2):279–291.
-
(2003)
Pattern Recognit
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
9
-
-
71549143789
-
Biometric Identification over Encrypted Data Made Feasible
-
Prakash A, Gupta I, (eds), Springer
-
Adjedj M, Bringer J, Chabanne H, Kindarji B: Biometric Identification over Encrypted Data Made Feasible. In ICISS, Volume 5905 of Lecture Notes in Computer Science. Edited by: Prakash A, Gupta I. Springer; 2009:86–100.
-
(2009)
ICISS, Volume 5905 of Lecture Notes in Computer Science
, pp. 86-100
-
-
Adjedj, M.1
Bringer, J.2
Chabanne, H.3
Kindarji, B.4
-
10
-
-
33244472491
-
Low distortion embeddings for edit distance
-
Gabow HN, Fagin R, (eds), ACM
-
Ostrovsky R, Rabani Y: Low distortion embeddings for edit distance. In STOC. Edited by: Gabow HN, Fagin R. ACM; 2005:218–224.
-
(2005)
STOC
, pp. 218-224
-
-
Ostrovsky, R.1
Rabani, Y.2
-
11
-
-
35348998047
-
-
Ostrovsky R, Rabani Y: Low distortion embeddings for edit distance. J ACM 2007.,54(5)
-
Ostrovsky R, Rabani Y: Low distortion embeddings for edit distance.J ACM 2007.,54(5):
-
-
-
-
12
-
-
0032201622
-
Private Information Retrieval
-
Chor B, Kushilevitz E, Goldreich O, Sudan M: Private Information Retrieval.J ACM 1998,45(6):965–981.
-
(1998)
J ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
13
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Gertner Y, Ishai Y, Kushilevitz E, Malkin T: Protecting data privacy in private information retrieval schemes.STOC 1998, 151–160.
-
(1998)
STOC
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
14
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
Caires L, Italiano GF, Monteiro L, Palamidessi C, Yung M, (eds), Springer
-
Gentry C, Ramzan Z: Single-database private information retrieval with constant communication rate. In ICALP, Volume 3580 of Lecture Notes in Computer Science. Edited by: Caires L, Italiano GF, Monteiro L, Palamidessi C, Yung M. Springer; 2005:803–815.
-
(2005)
ICALP, Volume 3580 of Lecture Notes in Computer Science
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
15
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
Zhou J, Lopez J, Deng RH, Bao F, (eds), Springer
-
Lipmaa H: An oblivious transfer protocol with log-squared communication. In ISC, Volume 3650 of Lecture Notes in Computer Science. Edited by: Zhou J, Lopez J, Deng RH, Bao F. Springer; 2005:314–328.
-
(2005)
ISC, Volume 3650 of Lecture Notes in Computer Science
, pp. 314-328
-
-
Lipmaa, H.1
-
16
-
-
84958809958
-
-
Gasarch WI: A Survey on Private Information Retrieval
-
Gasarch WI: A Survey on Private Information Retrieval. [http://www.cs.umd.edu/~gasarch/pir/pir.html]
-
-
-
-
17
-
-
0030714231
-
Private information storage (extended abstract)
-
Ostrovsky R, Shoup V: Private information storage (extended abstract).STOC 1997, 294–303.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
19
-
-
24644489770
-
Nearest neighbors in high-dimensional spaces
-
Goodman JE, O'Rourke J, (eds), CRC Press
-
Piotr I: Nearest neighbors in high-dimensional spaces. In Handbook of Discrete and Computational Geometry, Chapter 39. 2nd edition. Edited by: Goodman JE, O'Rourke J. CRC Press; 2004.
-
(2004)
Handbook of Discrete and Computational Geometry, Chapter 39
-
-
Piotr, I.1
-
22
-
-
0031644241
-
Approximate nearest neighbors: towards removing the curse of dimensionality
-
Piotr I, Rajeev M: Approximate nearest neighbors: towards removing the curse of dimensionality.Symposium on the Theory Of Computing 1998, 604–613.
-
(1998)
Symposium on the Theory Of Computing
, pp. 604-613
-
-
Piotr, I.1
Rajeev, M.2
-
23
-
-
37549058056
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
Andoni A, Piotr I: Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions.Commun ACM 2008, 51:117–122.
-
(2008)
Commun ACM
, vol.51
, pp. 117-122
-
-
Andoni, A.1
Piotr, I.2
-
24
-
-
44049109285
-
A Fast Search Algorithm for a Large Fuzzy Database
-
Hao F, Daugman J, Zielinski P: A Fast Search Algorithm for a Large Fuzzy Database.Inf Forensics Security, IEEE Trans 2008,3(2):203–212.
-
(2008)
Inf Forensics Security, IEEE Trans
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
25
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
Cachin C, Camenisch J, (eds), Springer
-
Boneh D, Di Crescenzo G, Ostrovsky R, Persiano G: Public Key Encryption with Keyword Search. In EUROCRYPT, Volume 3027 of LCNS. Edited by: Cachin C, Camenisch J. Springer; 2004:506–522.
-
(2004)
EUROCRYPT, Volume 3027 of LCNS
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
27
-
-
33751031560
-
New constructions and practical applications for private stream searching (extended abstract)
-
IEEE Computer Society
-
Bethencourt J, Song DX, Waters B: New constructions and practical applications for private stream searching (extended abstract). In IEEE Symposium on Security and Privacy. IEEE Computer Society; 2006:132–139.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 132-139
-
-
Bethencourt, J.1
Song, D.X.2
Waters, B.3
-
28
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom BH: Space/time trade-offs in hash coding with allowable errors.Commun ACM 1970,13(7):422–426.
-
(1970)
Commun ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
|