-
1
-
-
84885682738
-
-
Amazon, http://www.amazon.com
-
-
-
-
2
-
-
84885687723
-
-
Facebook, http://www.facebook.com
-
-
-
-
4
-
-
84885690594
-
-
Google+, https://plus.google.com
-
-
-
-
5
-
-
84885685503
-
-
Linkedin, http://www.linkedin.com
-
-
-
-
6
-
-
84885688906
-
-
TripAdvisor, http://www.tripadvisor.com
-
-
-
-
7
-
-
84885684872
-
-
Twitter, http://www.twitter.com
-
-
-
-
8
-
-
84885691144
-
-
Yelp, http://www.yelp.com
-
-
-
-
12
-
-
84865595447
-
Exploring linkability of user reviews
-
Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
-
Almishari, M., Tsudik, G.: Exploring linkability of user reviews. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 307-324. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7459
, pp. 307-324
-
-
Almishari, M.1
Tsudik, G.2
-
15
-
-
80053027350
-
Secure and efficient protocols for iris and fingerprint identification
-
Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
-
Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190-209. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6879
, pp. 190-209
-
-
Blanton, M.1
Gasti, P.2
-
16
-
-
84872732449
-
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
-
Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. Springer, Heidelberg
-
Blundo, C., De Cristofaro, E., Gasti, P.: EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 89-103. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7731
, pp. 89-103
-
-
Blundo, C.1
De Cristofaro, E.2
Gasti, P.3
-
18
-
-
74949095118
-
Practical Attacks Against Authorship Recognition Techniques
-
Brennan, M., Greenstadt, R.: Practical Attacks Against Authorship Recognition Techniques. In: IAAI (2009)
-
(2009)
IAAI
-
-
Brennan, M.1
Greenstadt, R.2
-
19
-
-
84863382720
-
On the security of the "Free-XOR" technique
-
Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
-
Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the security of the "Free-XOR" technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7194
, pp. 39-53
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.-S.4
-
20
-
-
84945124606
-
Multiparty Computation from Threshold Homomorphic Encryption
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001) (Pubitemid 33275838)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.B.3
-
21
-
-
84872740957
-
Fast and Private Computation of Cardinality of Set Intersection and Union
-
Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. Springer, Heidelberg
-
De Cristofaro, E., Gasti, P., Tsudik, G.: Fast and Private Computation of Cardinality of Set Intersection and Union. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 218-231. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7712
, pp. 218-231
-
-
De Cristofaro, E.1
Gasti, P.2
Tsudik, G.3
-
22
-
-
69949126271
-
-
Cryptology ePrint Archive, Report 2008/321
-
Damgård, I., Geisler, M., Krøigård, M.: A correction to efficient and secure comparison for on-line auctions. Cryptology ePrint Archive, Report 2008/321 (2008)
-
(2008)
A Correction to Efficient and Secure Comparison for On-line Auctions
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
23
-
-
70449575839
-
Homomorphic encryption and secure comparison
-
Damgård, I., Geisler, M., Krøigård, M.: Homomorphic encryption and secure comparison. Journal of Applied Cryptology 1(1), 22-31 (2008)
-
(2008)
Journal of Applied Cryptology
, vol.1
, Issue.1
, pp. 22-31
-
-
Damgård, I.1
Geisler, M.2
Krøigård, M.3
-
24
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
-
Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5443
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
25
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
Sion, R. (ed.) FC 2010. Springer, Heidelberg
-
De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143-159. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6052
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
26
-
-
69949163699
-
Privacy-preserving face recognition
-
Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
-
Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235-253. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5672
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
27
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
28
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: ACM Symposium on Theory of Computing, STOC, pp. 218-229 (1987)
-
(1987)
ACM Symposium on Theory of Computing, STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
29
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
30
-
-
79955547393
-
Efficient Set Operations in the Presence of Malicious Adversaries
-
Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
-
Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6056
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
31
-
-
78649992236
-
TASTY: Tool for Automating Secure Two-partY computations
-
Henecka, W., Kogl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: Tool for Automating Secure Two-partY computations. In: ACM Conference on Computer and Communications Security, CCS, pp. 451-462 (2010)
-
(2010)
ACM Conference on Computer and Communications Security, CCS
, pp. 451-462
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
32
-
-
84865598798
-
A unified data mining solution for authorship analysis in anonymous textual communications
-
Iqbal, F., Binsalleeh, H., Fung, B., Debbabi, M.: A unified data mining solution for authorship analysis in anonymous textual communications. In: Information Sciences (INS): Special Issue on Data Mining for Information Security (2011)
-
(2011)
Information Sciences (INS): Special Issue on Data Mining for Information Security
-
-
Iqbal, F.1
Binsalleeh, H.2
Fung, B.3
Debbabi, M.4
-
33
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
-
Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
34
-
-
77958056561
-
Fast secure computation of set intersection
-
Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
-
Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6280
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
36
-
-
33745160750
-
Privacy-preserving set operations
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
37
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
38
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldo̊rsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldo̊rsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
39
-
-
84957069091
-
Naive(bayes) at forty:The independence assumption in information retrieval
-
Nédellec, C., Rouveirol, C. (eds.) ECML 1998. Springer, Heidelberg
-
Lewis, D.D.: Naive(bayes) at forty:the independence assumption in information retrieval. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 4-15. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1398
, pp. 4-15
-
-
Lewis, D.D.1
-
40
-
-
84859465169
-
Secure distributed computation of the square root and applications
-
Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. Springer, Heidelberg
-
Liedel, M.: Secure distributed computation of the square root and applications. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 277-288. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7232
, pp. 277-288
-
-
Liedel, M.1
-
41
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - a secure two-party computation system. In: USENIX Security Symposium, pp. 287-302 (2004)
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
42
-
-
84864225669
-
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
-
Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. Springer, Heidelberg
-
McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299-318. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7384
, pp. 299-318
-
-
McDonald, A.W.E.1
Afroz, S.2
Caliskan, A.3
Stolerman, A.4
Greenstadt, R.5
-
43
-
-
84876100930
-
On the Feasibility of Internet-Scale Author Identification
-
Narayanan, A., Paskov, H., Gong, N., Bethencourt, J., Stefanov, E., Shin, E., Song, D.: On the Feasibility of Internet-Scale Author Identification. In: IEEE Symposium on Security and Privacy (2012)
-
IEEE Symposium on Security and Privacy (2012)
-
-
Narayanan, A.1
Paskov, H.2
Gong, N.3
Bethencourt, J.4
Stefanov, E.5
Shin, E.6
Song, D.7
-
44
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
45
-
-
72449131818
-
Secure two-party computation is practical
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 250-267
-
-
Pinkas, B.1
Schneider, T.2
Smart, N.P.3
Williams, S.C.4
-
46
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: ACM Symposium on Theory of Computing, STOC, pp. 73-85 (1989)
-
(1989)
ACM Symposium on Theory of Computing, STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
47
-
-
77954610725
-
Efficient privacy-preserving face recognition
-
Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
-
Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229-244. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5984
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
50
-
-
84983470508
-
Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network
-
Toutanova, K., Klein, D., Manning, C., Singer, Y.: Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network. In: HLT-NAACL (2003)
-
(2003)
HLT-NAACL
-
-
Toutanova, K.1
Klein, D.2
Manning, C.3
Singer, Y.4
|