-
2
-
-
84883277721
-
-
Apr.
-
Cookie Matching. http://developers.google.com/ad-exchange/rtb/cookie- guide, Apr. 2013.
-
(2013)
Cookie Matching
-
-
-
4
-
-
84883267682
-
-
DoubleClick Bid Request Message. https://developers.google.com/ad- exchange/rtb/downloads/realtime-bidding-proto.txt.
-
DoubleClick Bid Request Message
-
-
-
5
-
-
84883303690
-
-
DoubleClick Ad Exchange. http://google.com/doubleclick/advertisers/ad- exchange.html.
-
DoubleClick Ad Exchange
-
-
-
8
-
-
84883300745
-
-
Microsoft Media Network. http://advertising.microsoft.com/advertise/ microsoft-media-network.
-
Microsoft Media Network
-
-
-
9
-
-
84883304897
-
-
OpenX. http://www.openx.com.
-
-
-
-
10
-
-
84883304313
-
-
PAPI. http://icl.cs.utk.edu/papi/index.html.
-
PAPI
-
-
-
11
-
-
84883297342
-
-
Rightmedia. http://www.rightmedia.com.
-
-
-
-
14
-
-
73849126104
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
Y. Aumann and Y. Lindell. Security against covert adversaries: Efficient protocols for realistic adversaries. Journal of Cryptology, 23(2):281-343, 2010.
-
(2010)
Journal of Cryptology
, vol.23
, Issue.2
, pp. 281-343
-
-
Aumann, Y.1
Lindell, Y.2
-
16
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Nov.
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In ACM CCS, Nov. 1993.
-
(1993)
ACM CCS
-
-
Bellare, M.1
Rogaway, P.2
-
17
-
-
77955146714
-
Secure multiparty computation goes live
-
Feb.
-
P. Bogetoft, D. L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft. Secure multiparty computation goes live. In Financial Cryptography and Data Security, Feb. 2009.
-
(2009)
Financial Cryptography and Data Security
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
18
-
-
0005101868
-
Efficient proofs that a committed number lies in an interval
-
May
-
F. Boudot. Efficient proofs that a committed number lies in an interval. In EUROCRYPT, May 2000.
-
(2000)
EUROCRYPT
-
-
Boudot, F.1
-
19
-
-
33749009024
-
How to obtain full privacy in auctions
-
DOI 10.1007/s10207-006-0001-y
-
F. Brandt. How to obtain full privacy in auctions. International Journal of Information Security, 5(4):201-216, Oct. 2006. (Pubitemid 44446417)
-
(2006)
International Journal of Information Security
, vol.5
, Issue.4
, pp. 201-216
-
-
Brandt, F.1
-
21
-
-
78049389375
-
Efficient protocols for set membership and range proofs
-
Dec.
-
J. Camenisch, R. Chaabouni, and a. shelat. Efficient protocols for set membership and range proofs. In ASIACRYPT, Dec. 2008.
-
(2008)
ASIACRYPT
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
23
-
-
84866484075
-
Measuring and fingerprinting clickspam in online ad networks
-
Aug.
-
V. Dave, S. Guha, and Y. Zhang. Measuring and fingerprinting clickspam in online ad networks. In ACM SIGCOMM, Aug. 2012.
-
(2012)
ACM SIGCOMM
-
-
Dave, V.1
Guha, S.2
Zhang, Y.3
-
27
-
-
84883280132
-
Interleaving cryptography and mechanism design: The case of online auctions
-
Feb.
-
E. Elkind and H. Lipmaa. Interleaving cryptography and mechanism design: The case of online auctions. In Financial Cryptography, Feb. 2004.
-
(2004)
Financial Cryptography
-
-
Elkind, E.1
Lipmaa, H.2
-
28
-
-
84883279778
-
New non-interactive zero-knowledge subset sum, decision knapsack and range arguments
-
Report 2012/548, Feb.
-
P. Fauzi, H. Lipmaa, and B. Zhang. New non-interactive zero-knowledge subset sum, decision knapsack and range arguments. Cryptology ePrint Archive, Report 2012/548, Feb. 2013.
-
(2013)
Cryptology EPrint Archive
-
-
Fauzi, P.1
Lipmaa, H.2
Zhang, B.3
-
29
-
-
0000097412
-
How to prove yourself: Practical solutions to identification and signature problems
-
Nov.
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In CRYPTO, Nov. 1986.
-
(1986)
CRYPTO
-
-
Fiat, A.1
Shamir, A.2
-
31
-
-
84943299684
-
Privad: Practical privacy in online advertising
-
Mar.
-
S. Guha, B. Cheng, and P. Francis. Privad: Practical privacy in online advertising. In NSDI, Mar. 2011.
-
(2011)
NSDI
-
-
Guha, S.1
Cheng, B.2
Francis, P.3
-
32
-
-
78649288056
-
Fighting online click-fraud using bluff ads
-
Apr.
-
H. Haddadi. Fighting online click-fraud using bluff ads. ACM SIGCOMM CCR, 40(2):22-25, Apr. 2010.
-
(2010)
ACM SIGCOMM CCR
, vol.40
, Issue.2
, pp. 22-25
-
-
Haddadi, H.1
-
33
-
-
58049120018
-
PeerReview: Practical accountability for distributed systems
-
Oct.
-
A. Haeberlen, P. Kuznetsov, and P. Druschel. PeerReview: Practical accountability for distributed systems. In SOSP, Oct. 2007.
-
(2007)
SOSP
-
-
Haeberlen, A.1
Kuznetsov, P.2
Druschel, P.3
-
36
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
38
-
-
85076310416
-
ZKPDL: A language-based system for efficient zero-knowledge proofs and electronic cash
-
S. Meiklejohn, C. C. Erway, A. Küpçü, T. Hinkle, and A. Lysyanskaya. ZKPDL: A language-based system for efficient zero-knowledge proofs and electronic cash. In USENIX Security Symposium, Aug. 2010.
-
USENIX Security Symposium, Aug. 2010
-
-
Meiklejohn, S.1
Erway, C.C.2
Küpçü, A.3
Hinkle, T.4
Lysyanskaya, A.5
-
42
-
-
76749132694
-
Almost uniform density of power residues and the provable security of ESIGN
-
Nov.
-
T. Okamoto and J. Stern. Almost uniform density of power residues and the provable security of ESIGN. In ASIACRYPT, Nov. 2003.
-
(2003)
ASIACRYPT
-
-
Okamoto, T.1
Stern, J.2
-
44
-
-
34547358748
-
Practical secrecy-preserving, verifiably correct and trustworthy auctions
-
D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. A. Thorpe. Practical secrecy-preserving, verifiably correct and trustworthy auctions. In International Conference on Electronic Commerce, Aug. 2006.
-
International Conference on Electronic Commerce, Aug. 2006
-
-
Parkes, D.C.1
Rabin, M.O.2
Shieber, S.M.3
Thorpe, C.A.4
-
45
-
-
84883293315
-
Strictly-black-box zero-knowledge and efficient validation of financial transactions
-
M. O. Rabin, Y. Mansour, S. Muthukrishnan, and M. Yung. Strictly-black-box zero-knowledge and efficient validation of financial transactions. In International Colloquium on Automata, Languages and Programming, July 2012.
-
International Colloquium on Automata, Languages and Programming, July 2012
-
-
Rabin, M.O.1
Mansour, Y.2
Muthukrishnan, S.3
Yung, M.4
-
47
-
-
80755143986
-
Auctions in do-not-track compliant internet advertising
-
Oct.
-
A. Reznichenko, S. Guha, and P. Francis. Auctions in do-not-track compliant internet advertising. In ACM CCS, Oct. 2011.
-
(2011)
ACM CCS
-
-
Reznichenko, A.1
Guha, S.2
Francis, P.3
-
48
-
-
84883287664
-
-
Nov.
-
N. Singer. Your online attention, bought in an instant. http://www.nytimes.com/2012/11/18/technology/your-online-attention-bought-in-an- instant-by-advertisers. html, Nov. 2012. The New York Times.
-
(2012)
Your Online Attention, Bought in An Instant
-
-
Singer, N.1
-
49
-
-
82955165652
-
Understanding fraudulent activities in online ad exchanges
-
Nov.
-
B. Stone-Gross, R. Stevens, R. Kemmerer, C. Kruegel, G. Vigna, and A. Zarras. Understanding fraudulent activities in online ad exchanges. In IMC, Nov. 2011.
-
(2011)
IMC
-
-
Stone-Gross, B.1
Stevens, R.2
Kemmerer, R.3
Kruegel, C.4
Vigna, G.5
Zarras, A.6
-
51
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
Feb.
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy preserving targeted advertising. In NDSS, Feb. 2010.
-
(2010)
NDSS
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
52
-
-
34548114533
-
Undesirable and fraudulent behavior in online auctions
-
Aug.
-
J. Trevathan and W. Read. Undesirable and fraudulent behavior in online auctions. In SECRYPT, Aug. 2006.
-
(2006)
SECRYPT
-
-
Trevathan, J.1
Read, W.2
-
53
-
-
84883305908
-
-
Apr.
-
V. Vaidya. Cookie synching. http://www.admonsters.com/blog/cookie- synching, Apr. 2010.
-
(2010)
Cookie Synching
-
-
Vaidya, V.1
-
55
-
-
78650756302
-
-
Technical Report LCA-REPORT-2008-017, Laboratory for Computer Communications and Applications, École Polytechnique Fédé rale de Lausanne, July
-
N. Vratonjic, J. Freudiger, J.-P. Hubaux, and M. Felegyhazi. Securing online advertising. Technical Report LCA-REPORT-2008-017, Laboratory for Computer Communications and Applications, École Polytechnique Fédérale de Lausanne, July 2008.
-
(2008)
Securing Online Advertising
-
-
Vratonjic, N.1
Freudiger, J.2
Hubaux, J.-P.3
Felegyhazi, M.4
-
58
-
-
0038030410
-
An integrated experimental environment for distributed systems and networks
-
Dec.
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An integrated experimental environment for distributed systems and networks. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
59
-
-
0022882770
-
How to generate and exchange secrets
-
Oct.
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, Oct. 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
-
61
-
-
84866489018
-
Private and verifiable interdomain routing decisions
-
Aug.
-
M. Zhao, W. Zhou, A. J. Gurney, A. Haeberlen, M. Sherr, and B. T. Loo. Private and verifiable interdomain routing decisions. In ACM SIGCOMM, Aug. 2012.
-
(2012)
ACM SIGCOMM
-
-
Zhao, M.1
Zhou, W.2
Gurney, A.J.3
Haeberlen, A.4
Sherr, M.5
Loo, B.T.6
|