-
1
-
-
84889074923
-
-
Hadoop
-
Hadoop. http://hadoop.apache.org/.
-
-
-
-
2
-
-
84889063505
-
-
Murmurhash
-
Murmurhash. https://code.google.com/p/smhasher/.
-
-
-
-
3
-
-
84889055448
-
-
Opencl
-
Opencl. http://www.khronos.org/opencl/.
-
-
-
-
6
-
-
80755143980
-
Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, and G. Tsudik. Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In ACM Conference on Computer and Communications Security, pages 691-702, 2011.
-
(2011)
ACM Conference on Computer and Communications Security
, pp. 691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
7
-
-
0029702967
-
Correlated pseudorandomness and the complexity of private computations
-
D. Beaver. Correlated pseudorandomness and the complexity of private computations. In STOC, pages 479-488, 1996.
-
(1996)
STOC
, pp. 479-488
-
-
Beaver, D.1
-
9
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7):422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
10
-
-
52049099367
-
On the false-positive rate of bloom filters
-
P. Bose, H. Guo, E. Kranakis, A. Maheshwari, P. Morin, J. Morrison, M. H. M. Smid, and Y. Tang. On the false-positive rate of bloom filters. Inf. Process. Lett., 108(4):210-213, 2008.
-
(2008)
Inf. Process. Lett.
, vol.108
, Issue.4
, pp. 210-213
-
-
Bose, P.1
Guo, H.2
Kranakis, E.3
Maheshwari, A.4
Morin, P.5
Morrison, J.6
Smid, M.H.M.7
Tang, Y.8
-
11
-
-
80051990340
-
Openconflict: Preventing real time map hacks in online games
-
E. Bursztein, M. Hamburg, J. Lagarenne, and D. Boneh. Openconflict: Preventing real time map hacks in online games. In IEEE Symposium on Security and Privacy, pages 506-520, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 506-520
-
-
Bursztein, E.1
Hamburg, M.2
Lagarenne, J.3
Boneh, D.4
-
13
-
-
68949136946
-
Efficient robust private set intersection
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung. Efficient robust private set intersection. In ACNS, pages 125-142, 2009.
-
(2009)
ACNS
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
15
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
E. De Cristofaro, J. Kim, and G. Tsudik. Linear-complexity private set intersection protocols secure in malicious model. In ASIACRYPT, pages 213-231, 2010.
-
(2010)
ASIACRYPT
, pp. 213-231
-
-
De Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
16
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
E. De Cristofaro and G. Tsudik. Practical private set intersection protocols with linear complexity. In Financial Cryptography, pages 143-159, 2010.
-
(2010)
Financial Cryptography
, pp. 143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
17
-
-
84863221426
-
Experimenting with fast private set intersection
-
E. De Cristofaro and G. Tsudik. Experimenting with fast private set intersection. In TRUST, pages 55-73, 2012.
-
(2012)
TRUST
, pp. 55-73
-
-
De Cristofaro, E.1
Tsudik, G.2
-
18
-
-
85030321143
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat. Mapreduce: Simplified data processing on large clusters. In OSDI, pages 137-150, 2004.
-
(2004)
OSDI
, pp. 137-150
-
-
Dean, J.1
Ghemawat, S.2
-
20
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6):637-647, 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
21
-
-
35048820609
-
Efficient private matching and set intersection
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, pages 1-19, 2004.
-
(2004)
EUROCRYPT
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
23
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell. Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In TCC, pages 155-175, 2008.
-
(2008)
TCC
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
24
-
-
79955547393
-
Efficient set operations in the presence of malicious adversaries
-
C. Hazay and K. Nissim. Efficient set operations in the presence of malicious adversaries. In Public Key Cryptography, pages 312-331, 2010.
-
(2010)
Public Key Cryptography
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
25
-
-
85168150014
-
Private set intersection: Are garbled circuits better than custom protocols?
-
Y. Huang, D. Evans, and J. Katz. Private set intersection: Are garbled circuits better than custom protocols? In NDSS, 2012.
-
(2012)
NDSS
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
-
26
-
-
24144457853
-
Extending oblivious transfers efficiently
-
Y. Ishai, J. Kilian, K. Nissim, and E. Petrank. Extending oblivious transfers efficiently. In CRYPTO, pages 145-161, 2003.
-
(2003)
CRYPTO
, pp. 145-161
-
-
Ishai, Y.1
Kilian, J.2
Nissim, K.3
Petrank, E.4
-
27
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection
-
S. Jarecki and X. Liu. Efficient oblivious pseudorandom function with applications to adaptive OT and secure computation of set intersection. In TCC, pages 577-594, 2009.
-
(2009)
TCC
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
28
-
-
77958056561
-
Fast secure computation of set intersection
-
S. Jarecki and X. Liu. Fast secure computation of set intersection. In SCN, pages 418-435, 2010.
-
(2010)
SCN
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
29
-
-
84871965745
-
Outsourced private set intersection using homomorphic encryption
-
F. Kerschbaum. Outsourced private set intersection using homomorphic encryption. In ASIACCS, pages 85-86, 2012.
-
(2012)
ASIACCS
, pp. 85-86
-
-
Kerschbaum, F.1
-
30
-
-
33745160750
-
Privacy-preserving set operations
-
L. Kissner and D. X. Song. Privacy-preserving set operations. In CRYPTO, pages 241-257, 2005.
-
(2005)
CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
32
-
-
71549134004
-
Privacy-preserving relationship path discovery in social networks
-
G. Mezzour, A. Perrig, V. D. Gligor, and P. Papadimitratos. Privacy-preserving relationship path discovery in social networks. In CANS, pages 189-208, 2009.
-
(2009)
CANS
, pp. 189-208
-
-
Mezzour, G.1
Perrig, A.2
Gligor, V.D.3
Papadimitratos, P.4
-
33
-
-
85059753615
-
Botgrep: Finding P2P bots with structured graph analysis
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov. Botgrep: Finding P2P bots with structured graph analysis. In USENIX Security Symposium, pages 95-110, 2010.
-
(2010)
USENIX Security Symposium
, pp. 95-110
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
34
-
-
64049119146
-
Efficient oblivious transfer protocols
-
M. Naor and B. Pinkas. Efficient oblivious transfer protocols. In SODA, pages 448-457, 2001.
-
(2001)
SODA
, pp. 448-457
-
-
Naor, M.1
Pinkas, B.2
-
35
-
-
85150485002
-
Location privacy via private proximity testing
-
A. Narayanan, N. Thiagarajan, M. Lakhani, M. Hamburg, and D. Boneh. Location privacy via private proximity testing. In NDSS, 2011.
-
(2011)
NDSS
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Boneh, D.5
-
37
-
-
77957859235
-
Cardinality estimation and dynamic length adaptation for bloom filters
-
O. Papapetrou, W. Siberski, and W. Nejdl. Cardinality estimation and dynamic length adaptation for bloom filters. Distributed and Parallel Databases, 28(2-3):119-156, 2010.
-
(2010)
Distributed and Parallel Databases
, vol.28
, Issue.2-3
, pp. 119-156
-
-
Papapetrou, O.1
Siberski, W.2
Nejdl, W.3
-
40
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|