-
1
-
-
84884999092
-
Verified computational differential privacy with applications to smart metering
-
IEEE
-
G. Barthe, G. Danezis, B. Grégoire, C. Kunz, and S. Zanella-Béguelin. Verified computational differential privacy with applications to smart metering. In 26th IEEE Computer Security Foundations Symposium, CSF 2013. IEEE, 2013.
-
(2013)
26th IEEE Computer Security Foundations Symposium, CSF 2013
-
-
Barthe, G.1
Danezis, G.2
Grégoire, B.3
Kunz, C.4
Zanella-Béguelin, S.5
-
2
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Computer Security - ESORICS 2008, Springer
-
D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In Computer Security - ESORICS 2008, volume 5283 of LNCS, pages 192-206. Springer, 2008.
-
(2008)
LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
3
-
-
77958074910
-
Improved primitives for secure multiparty integer computation
-
Security and Cryptography for Networks, SCN 2010, Springer
-
O. Catrina and S. De Hoogh. Improved primitives for secure multiparty integer computation. In Security and Cryptography for Networks, SCN 2010, volume 6280 of LNCS, pages 182-199. Springer, 2010.
-
(2010)
LNCS
, vol.6280
, pp. 182-199
-
-
Catrina, O.1
De Hoogh, S.2
-
4
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
3rd Theory of Cryptography Conference, TCC 2006
-
I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In 3rd Theory of Cryptography Conference, TCC 2006, volume 3876 of LNCS, pages 285-304. 2006.
-
(2006)
LNCS
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
5
-
-
84880857531
-
Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits
-
I. Damgård, M. Keller, E. Larraia, V. Pastro, P. Scholl, and N. P. Smart. Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits. IACR Cryptology ePrint Archive, 2012:642, 2012.
-
(2012)
IACR Cryptology EPrint Archive
, vol.2012
, pp. 642
-
-
Damgård, I.1
Keller, M.2
Larraia, E.3
Pastro, V.4
Scholl, P.5
Smart, N.P.6
-
6
-
-
84864975035
-
Multiparty computation from somewhat homomorphic encryption
-
Advances in Cryptology - CRYPTO 2012, Springer
-
I. Damgård, V. Pastro, N. P. Smart, and S. Zakarias. Multiparty computation from somewhat homomorphic encryption. In Advances in Cryptology - CRYPTO 2012, volume 7417 of LNCS, pages 643-662. Springer, 2012.
-
(2012)
LNCS
, vol.7417
, pp. 643-662
-
-
Damgård, I.1
Pastro, V.2
Smart, N.P.3
Zakarias, S.4
-
8
-
-
84889058456
-
Implementation of privacy-friendly aggregation for the smart grid
-
B. Defend and K. Kursawe. Implementation of privacy-friendly aggregation for the smart grid. In HotPETS, 2013.
-
(2013)
HotPETS
-
-
Defend, B.1
Kursawe, K.2
-
11
-
-
84864248755
-
Fault-tolerant privacy-preserving statistics
-
12th Intl. Symp. on Privacy Enhancing Technologies, PETS 2012, Springer
-
M. Jawurek and F. Kerschbaum. Fault-tolerant privacy-preserving statistics. In 12th Intl. Symp. on Privacy Enhancing Technologies, PETS 2012, volume 7384 of LNCS, pages 221-238. Springer, 2012.
-
(2012)
LNCS
, vol.7384
, pp. 221-238
-
-
Jawurek, M.1
Kerschbaum, F.2
-
12
-
-
79961183580
-
Plug-in privacy for smart metering billing
-
11th Intl. Symp. on Privacy Enhancing Technologies, PETS 2011, Springer
-
M. Jawurek, M. Johns, and F. Kerschbaum. Plug-in privacy for smart metering billing. In 11th Intl. Symp. on Privacy Enhancing Technologies, PETS 2011, volume 6794 of LNCS, pages 192-210. Springer, 2011.
-
(2011)
LNCS
, vol.6794
, pp. 192-210
-
-
Jawurek, M.1
Johns, M.2
Kerschbaum, F.3
-
14
-
-
84855937100
-
Smart metering under EU data protection law
-
R. Knyrim and G. Trieb. Smart metering under EU data protection law. Intl. Data Privacy Law, 1(2):121-128, 2011.
-
(2011)
Intl. Data Privacy Law
, vol.1
, Issue.2
, pp. 121-128
-
-
Knyrim, R.1
Trieb, G.2
-
15
-
-
79961178921
-
Privacy-friendly aggregation for the smart-grid
-
11th Intl. Symp. on Privacy Enhancing Technologies, PETS 2011, Springer
-
K. Kursawe, G. Danezis, and M. Kohlweiss. Privacy-friendly aggregation for the smart-grid. In 11th Intl. Symp. on Privacy Enhancing Technologies, PETS 2011, volume 6794 of LNCS, pages 175-191. Springer, 2011.
-
(2011)
LNCS
, vol.6794
, pp. 175-191
-
-
Kursawe, K.1
Danezis, G.2
Kohlweiss, M.3
-
16
-
-
84976772007
-
Parallel prefix computation
-
R. E. Ladner and M. J. Fischer. Parallel prefix computation. J. ACM, 27(4):831-838, 1980.
-
(1980)
J. ACM
, vol.27
, Issue.4
, pp. 831-838
-
-
Ladner, R.E.1
Fischer, M.J.2
-
17
-
-
84884945801
-
Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error
-
13th Intl. Symp. on Privacy Enhancing Technologies, PETS 2013
-
Q. Li and G. Cao. Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error. In 13th Intl. Symp. on Privacy Enhancing Technologies, PETS 2013, volume 7981 of LNCS, pages 60-81. 2013.
-
(2013)
LNCS
, vol.7981
, pp. 60-81
-
-
Li, Q.1
Cao, G.2
-
18
-
-
85084163840
-
Fairplay-secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay-secure two-party computation system. In USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
19
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. McDaniel and S. McLaughlin. Security and privacy challenges in the smart grid. Security & Privacy, IEEE, 7(3):75-77, 2009.
-
(2009)
Security & Privacy, IEEE
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
20
-
-
84881259359
-
Pinocchio: Nearly practical verifiable computation
-
IEEE
-
B. Parno, C. Gentry, J. Howell, and M. Raykova. Pinocchio: Nearly practical verifiable computation. In 2013 IEEE Symp. on Security and Privacy, pages 238-252. IEEE, 2013.
-
(2013)
2013 IEEE Symp. on Security and Privacy
, pp. 238-252
-
-
Parno, B.1
Gentry, C.2
Howell, J.3
Raykova, M.4
-
22
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
The Internet Society
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In 2011 Network and Distributed System Security Symposium, NDSS 2011. The Internet Society, 2011.
-
(2011)
2011 Network and Distributed System Security Symposium, NDSS 2011
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
23
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
Public Key Cryptography - PKC 2010, Springer
-
N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography - PKC 2010, volume 6056 of LNCS, pages 420-443. Springer, 2010.
-
(2010)
LNCS
, vol.6056
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
|