-
3
-
-
84890348565
-
Collaborative, privacy-preserving data aggregation at scale
-
Applebaum, B., Ringberg, H., Freedman, M. J., CAESAR, M., and REXFORD, J. 2010. Collaborative, privacy-preserving data aggregation at scale. In Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
-
(2010)
Proceedings of the Privacy Enhancing Technologies Symposium (PETS)
-
-
Applebaum, B.1
Ringberg, H.2
Freedman, M.J.3
CAESAR, M.4
REXFORD, J.5
-
11
-
-
51849143985
-
Secure multiparty computation goes live
-
Bogetoft, P., Christensen, D., Damgard, I., Geisler, M., Jakobsen, T., Kroigaard, M., Nielsen, J., Nielsen, J., Nielsen, K., Pagter, J., et al. 2009. Secure multiparty computation goes live. In Proceedings of the Financial Cryptography Association.
-
(2009)
Proceedings of the Financial Cryptography Association.
-
-
Bogetoft, P.1
Christensen, D.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
Kroigaard, M.6
Nielsen, J.7
Nielsen, J.8
Nielsen, K.9
Pagter, J.10
-
12
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
Brauckhoff, D., Dimitropoulos, X., Wagner, A., and Salamatian, K. 2009a. Anomaly extraction in backbone networks using association rules. In Proceedings of the Internet Measurement Conference (IMC).
-
(2009)
Proceedings of the Internet Measurement Conference (IMC).
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
19
-
-
33746065125
-
Unconditionally secure constant-rounds multiparty computation for equality, comparison, bits and exponentiation
-
Damgard, I. Fitzi, M. Kiltz, E. Nielsen, J. and Toft, T. 2006. Unconditionally secure constant-rounds multiparty computation for equality, comparison, bits and exponentiation. In Proceedings of the Theory of Cryptography Conference (TCC).
-
(2006)
Proceedings of the Theory of Cryptography Conference (TCC)
-
-
Damgard, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
26
-
-
35048820609
-
Efficient private matching and set intersection
-
Lecture Notes in Computer Science Springer Berlin
-
Freedman, M. J., Nissim, K., and Pinkas, B. 2004. Efficient private matching and set intersection. In Proceedings of the EUROCRYPT. Lecture Notes in Computer Science, vol. 3027, Springer Berlin, 1-19.
-
(2004)
Proceedings of the EUROCRYPT.
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
27
-
-
84948182613
-
On 2-round secure multiparty computation
-
Gennaro, R., Ishai, Y., Kushilevitz, E., and Rabin, T. 2002. On 2-round secure multiparty computation. In Proceedings of CRYPTO.
-
(2002)
Proceedings of CRYPTO
-
-
Gennaro, R.1
Ishai, Y.2
Kushilevitz, E.3
Rabin, T.4
-
32
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., and Lakhina, A. 2006. Detection and identification of network anomalies using sketch subspaces. In Proceedings of the Internet Measurement Conference (IMC).
-
(2006)
Proceedings of the Internet Measurement Conference (IMC).
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
35
-
-
3142592508
-
Evaluating top-k queries over web-accessible databases
-
Marian, A., Bruno, N., and Gravano, L. 2004. Evaluating top-k queries over web-accessible databases. ACM Trans. Datab. Syst. 29, 2, 319-362.
-
(2004)
ACM Trans. Datab. Syst.
, vol.29
, pp. 319-362
-
-
Marian, A.1
Bruno, N.2
Gravano, L.3
-
39
-
-
34548301939
-
Dowitcher: Effective worm detection and containment in the internet core
-
Ranjan, S., Shah, S., Nucci, A., Munafo, M. M., Cruz, R. L., and Muthukrishnan, S. M. 2007. Dowitcher: Effective worm detection and containment in the internet core. In Proceedings of INFOCOM.
-
(2007)
Proceedings of INFOCOM.
-
-
Ranjan, S.1
Shah, S.2
Nucci, A.3
Munafo, M.M.4
Cruz, R.L.5
Muthukrishnan, S.M.6
-
40
-
-
84871156099
-
Privacy-preserving collaborative anomaly detection
-
Ph.D. thesis, Princeton University.
-
Ringberg, H. 2009. Privacy-preserving collaborative anomaly detection. Ph.D. thesis, Princeton University.
-
(2009)
-
-
Ringberg, H.1
-
41
-
-
58049106973
-
Understanding Skype signaling
-
Rossi, D., Mellia, M., and Meo, M. 2009. Understanding Skype signaling. Comput. Netw. 53, 2, 130-140.
-
(2009)
Comput. Netw.
, vol.53
, pp. 130-140
-
-
Rossi, D.1
Mellia, M.2
Meo, M.3
-
43
-
-
33847327063
-
Secure distributed data-mining and its application to large-scale network measurements
-
Roughan, M. and Zhang, Y. 2006b. Secure distributed data-mining and its application to large-scale network measurements. Comput. Comm. Rev. 36, 1, 7-14.
-
(2006)
Comput. Comm. Rev.
, vol.36
, pp. 7-14
-
-
Roughan, M.1
Zhang, Y.2
-
44
-
-
41549104640
-
Efficient protocols for privacy preserving matching against distributed datasets
-
Sang, Y., Shen, H., Tan, Y., and Xiong, N. 2006. Efficient protocols for privacy preserving matching against distributed datasets. In Proceedings of the Conference on Information and Communications Security (ICICS).
-
(2006)
Proceedings of the Conference on Information and Communications Security (ICICS).
-
-
Sang, Y.1
Shen, H.2
Tan, Y.3
Xiong, N.4
-
45
-
-
0018545449
-
How to share a secret
-
Shamir, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
47
-
-
3042683635
-
Worm and attack early warning
-
Stolfo, S. J. 2004. Worm and attack early warning. IEEE Secur. Priv. 2, 3, 73-75.
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 73-75
-
-
Stolfo, S.J.1
-
48
-
-
84877623211
-
Switch. The Swiss education and research network
-
http://www.switch.ch.
-
Switch. The Swiss education and research network. http://www.switch.ch.
-
-
-
-
49
-
-
76749138554
-
Detecting network neutrality violations with causal inference
-
Tariq, M. B., Motiwala, M., Feamster, N., and Ammar, M. 2009. Detecting network neutrality violations with causal inference. In Proceedings of the Conference on Emerging Networking Experiments and Technologies (CoNEXT).
-
(2009)
Proceedings of the Conference on Emerging Networking Experiments and Technologies (CoNEXT).
-
-
Tariq, M.B.1
Motiwala, M.2
Feamster, N.3
Ammar, M.4
-
50
-
-
80052448813
-
Accurate network anomaly classification with generalized entropy metrics
-
Tellenbach, B., Burkhart, M., Schatzmann, D., Gugelmann, D., and Sornette, D. 2011. Accurate network anomaly classification with generalized entropy metrics. Comput. Netw. 55, 15, 3485-3502.
-
(2011)
Comput. Netw.
, vol.55
, pp. 3485-3502
-
-
Tellenbach, B.1
Burkhart, M.2
Schatzmann, D.3
Gugelmann, D.4
Sornette, D.5
-
52
-
-
69249241437
-
Privacy-preserving kth element score over vertically partitioned data
-
Vaidya, J. and Clifton, C. 2009. Privacy-preserving kth element score over vertically partitioned data. IEEE Trans. Knowl. Data 21, 2, 253-258.
-
(2009)
IEEE Trans. Knowl. Data
, vol.21
, pp. 253-258
-
-
Vaidya, J.1
Clifton, C.2
|