-
1
-
-
24144449674
-
Secure computation of the k-th ranked element
-
May
-
G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k-th ranked element. In Eurocrypt, May 2004.
-
(2004)
Eurocrypt
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
3
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara. Private collaborative forecasting and benchmarking. In ACM Workshop on Privacy in the Electronic Society (WPES'04), Oct. 2004.
-
ACM Workshop on Privacy in the Electronic Society (WPES'04), Oct. 2004
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
5
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Jul.
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, Jul. 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
6
-
-
0035751060
-
Provably authenticated group Diffie-Hellman key exchange
-
E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably authenticated group Diffie-Hellman key exchange. In Proceedings of the 8th ACM conference on Computer and Communications Security (CCS'01), pages 255-264, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS'01)
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.-J.4
-
7
-
-
34250622667
-
-
Sept.
-
California Senate Bill SB 1386, Sept. 2002. 〈http://info.sen.ca.gov/ pub/01-02/bill/sen/sb-1351-1400/sb-1386-bill-20020926-chaptered.html〉.
-
(2002)
California Senate Bill SB 1386
-
-
-
9
-
-
84885237975
-
-
Web site
-
DeepSight analyzer. Web site, 2006. 〈http://analyzer.symantec.com/ 〉.
-
(2006)
DeepSight Analyzer
-
-
-
12
-
-
33646793324
-
ABACUS: A distributed middleware for privacy preserving data sharing across private data warehouses
-
DOI 10.1007/11587552-2, Middleware 2005: ACM/IFIP/USENIX 6th International Middleware Conference, Proceedings
-
F. Emekci, D. Agrawal, and A. E. Abbadi. ABACUS: A distributed middleware for privacy preserving data sharing across private data warehouses. In Proceedings of Middleware 2005, volume 3790 of Lecture Notes in Computer Science, pages 21-41. Springer-Verlag, 2005. (Pubitemid 43763627)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3790 LNCS
, pp. 21-41
-
-
Emekci, F.1
Agrawal, D.2
El, A.A.3
-
13
-
-
4444266989
-
Prefix-preserving IP address anonymization
-
Oct.
-
J. Fan, J. Xu, M. Ammar, and S. Moon. Prefix-preserving IP address anonymization. Computer Networks, 46(2):253-272, Oct. 2004.
-
(2004)
Computer Networks
, vol.46
, Issue.2
, pp. 253-272
-
-
Fan, J.1
Xu, J.2
Ammar, M.3
Moon, S.4
-
14
-
-
21644455412
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In Symposium on Operating Systems Principles, 2003.
-
Symposium on Operating Systems Principles, 2003
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
0003839182
-
-
Working draft, Version 1.4, Oct.
-
O. Goldreich. Secure multi-party computation. Working draft, Version 1.4, Oct. 2002. 〈http://www.wisdom.weizmann.ac.il/~odedg/pp.html〉.
-
(2002)
Secure Multi-party Computation
-
-
Goldreich, O.1
-
16
-
-
23844515436
-
Random-data perturbation techniques and privacy-preserving data mining
-
DOI 10.1007/s10115-004-0173-6
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. Random data perturbation techniques and privacy preserving data mining. Knowledge and Information Systems Journal, 7(4):387-414, 2005. (Pubitemid 41166792)
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 387-414
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
21
-
-
84885230153
-
-
Web site, May
-
McAfee IntruShield Security Manager. Web site, May 2006. 〈http://www.mcafee.com/us/enterprise/products/network-intrusion-prevention/ intrushield-security-management-system.html〉.
-
(2006)
McAfee IntruShield Security Manager
-
-
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Springer-Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
R. Pang and V. Paxson. A high-level programming environment for packet trace anonymization and transformation. In Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'03), 2003.
-
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'03), 2003
-
-
Pang, R.1
Paxson, V.2
-
26
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
27
-
-
84885229332
-
-
Web site, May
-
Planetlab. Web site, May 2006. 〈http://www.planet-lab.org/php/pr/ 〉.
-
(2006)
-
-
-
31
-
-
0002473030
-
DIDS (distributed intrusion detection system) - Motivation, architecture, and an early prototype
-
S. R. Snapp, J. Brentano, G. V. Dias, T. L. Goan, L. T. Heberlein, C.-L. Ho, K. N. Levitt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur. DIDS (distributed intrusion detection system) - motivation, architecture, and an early prototype. In Proc. 14th NIST-NCSC National Computer Security Conference, 1991.
-
Proc. 14th NIST-NCSC National Computer Security Conference, 1991
-
-
Snapp, S.R.1
Brentano, J.2
Dias, G.V.3
Goan, T.L.4
Heberlein, L.T.5
Ho, C.-L.6
Levitt, K.N.7
Mukherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
33
-
-
84885209511
-
-
Web site, May
-
Tcpdump public repository. Web site, May 2006. 〈http://www.tcpdump. org〉.
-
(2006)
Tcpdump Public Repository
-
-
-
34
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
DOI 10.1145/974121.974131
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Record, 33(1):50-57, 2004. (Pubitemid 40290240)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
|