-
1
-
-
0345565888
-
The many faces of publish/subscribe
-
Eugster, P.T., Felber, P., Guerraoui, R., Kermarrec, A.M.: The many faces of publish/subscribe. ACM Comput. Surv. 35(2), 114-131 (2003)
-
(2003)
ACM Comput. Surv.
, vol.35
, Issue.2
, pp. 114-131
-
-
Eugster, P.T.1
Felber, P.2
Guerraoui, R.3
Kermarrec, A.M.4
-
2
-
-
0022882770
-
How to generate and exchange secrets
-
extended abstract
-
Yao, A.C.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.C.C.1
-
3
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
Impagliazzo, R., Rudich, S.: Limits on the provable consequences of one-way permutations. In: STOC, pp. 44-61 (1989)
-
(1989)
STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
4
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
5
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
extended abstract
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
6
-
-
0027986369
-
A minimal model for secure computation
-
extended abstract
-
Feige, U., Kilian, J., Naor,M.: A minimal model for secure computation (extended abstract). In: STOC, pp. 554-563 (1994)
-
(1994)
STOC
, pp. 554-563
-
-
Feige, U.1
Kilian, J.2
Naor, M.3
-
7
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S.,Micali, S.: How to construct random functions. J. ACM33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
50049089599
-
Enabling confidentiality in content-based publish/subscribe infrastructures
-
Raiciu, C., Rosenblum, D.S.: Enabling confidentiality in content-based publish/subscribe infrastructures. In: SecureComm, pp. 1-11 (2006)
-
(2006)
SecureComm
, pp. 1-11
-
-
Raiciu, C.1
Rosenblum, D.S.2
-
9
-
-
70349244709
-
Secure aggregation in a publish-subscribe system
-
Minami, K., Lee, A.J., Winslett, M., Borisov, N.: Secure aggregation in a publish-subscribe system. In: WPES, pp. 95-104 (2008)
-
(2008)
WPES
, pp. 95-104
-
-
Minami, K.1
Lee, A.J.2
Winslett, M.3
Borisov, N.4
-
10
-
-
84885059952
-
Privacy-preserving content-based publish/subscribe networks
-
Gritzalis, D., Lopez, J. (eds.) SEC 2009. Springer, Heidelberg
-
Shikfa, A., Önen, M., Molva, R.: Privacy-preserving content-based publish/subscribe networks. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 270-282. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.297
, pp. 270-282
-
-
Shikfa, A.1
Önen, M.2
Molva, R.3
-
11
-
-
77955821729
-
Providing basic security mechanisms in broker-less publish/subscribe systems
-
Tariq, M.A., Koldehofe, B., Altaweel, A., Rothermel, K.: Providing basic security mechanisms in broker-less publish/subscribe systems. In: DEBS, pp. 38-49 (2010)
-
(2010)
DEBS
, pp. 38-49
-
-
Tariq, M.A.1
Koldehofe, B.2
Altaweel, A.3
Rothermel, K.4
-
12
-
-
78049360046
-
A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations
-
Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. Springer, Heidelberg
-
Choi, S., Ghinita, G., Bertino, E.: A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010, Part I. LNCS, vol. 6261, pp. 368-384. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6261
, pp. 368-384
-
-
Choi, S.1
Ghinita, G.2
Bertino, E.3
-
13
-
-
84878346477
-
Supporting publication and subscription confidentiality in pub/sub networks
-
Jajodia, S., Zhou, J. (eds.) SecureComm 2010. Springer, Heidelberg
-
Ion, M., Russello, G., Crispo, B.: Supporting publication and subscription confidentiality in pub/sub networks. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 272-289. Springer, Heidelberg (2010)
-
(2010)
LNICST
, vol.50
, pp. 272-289
-
-
Ion, M.1
Russello, G.2
Crispo, B.3
-
14
-
-
84869830676
-
P3S: A privacy preserving publish-subscribe middleware
-
Narasimhan, P., Triantafillou, P. (eds.) Middleware 2012. Springer, Heidelberg
-
Pal, P., Lauer, G., Khoury, J., Hoff, N., Loyall, J.: P3S: A privacy preserving publish-subscribe middleware. In: Narasimhan, P., Triantafillou, P. (eds.) Middleware 2012. LNCS, vol. 7662, pp. 476-495. Springer, Heidelberg (2012)
-
LNCS
, vol.7662
, Issue.2012
, pp. 476-495
-
-
Pal, P.1
Lauer, G.2
Khoury, J.3
Hoff, N.4
Loyall, J.5
-
15
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: FOCS, pp. 136-145 (2001)
-
(2001)
FOCS
, pp. 136-145
-
-
Canetti, R.1
-
16
-
-
84957690041
-
Conditional oblivious transfer and timed-release encryption
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Di Crescenzo, G., Ostrovsky, R., Rajagopalan, S.: Conditional oblivious transfer and timed-release encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 74-89. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 74-89
-
-
Di Crescenzo, G.1
Ostrovsky, R.2
Rajagopalan, S.3
-
18
-
-
84958983089
-
Sharing block ciphers
-
Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. Springer, Heidelberg
-
Brickell, E., Di Crescenzo, G., Frankel, Y.: Sharing block ciphers. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol. 1841, pp. 457-470. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1841
, pp. 457-470
-
-
Brickell, E.1
Di Crescenzo, G.2
Frankel, Y.3
|