-
1
-
-
84856190322
-
Access control in a peer-to-peer social network. Master’s thesis
-
Lausanne, Switzerland
-
Afify Y (2008) Access control in a peer-to-peer social network. Master’s thesis, EPFL, Lausanne, Switzerland
-
(2008)
EPFL
-
-
Afify, Y.1
-
2
-
-
83655202879
-
Stealing reality: When criminals become data scientists (or vice versa)
-
Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). Intell Syst IEEE 26(6):22-30
-
(2011)
Intell Syst IEEE
, vol.26
, Issue.6
, pp. 22-30
-
-
Altshuler, Y.1
Aharony, N.2
Pentland, A.3
Elovici, Y.4
Cebrian, M.5
-
3
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D. (2009) Persona: an online social network with user-defined privacy. SIGCOMM Comput Commun Rev 39:135-146. http://doi. acm.org/10.1145/1594977.1592585
-
(2009)
SIGCOMM Comput Commun
, vol.39
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
4
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
symposium on security and privacy, SP’07, Berkeley, IEEE Computer Society, Los Alamitos
-
Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 I.E. symposium on security and privacy, SP’07, Berkeley. IEEE Computer Society, Los Alamitos, pp 321-334. http://dx.doi.org/10.1109/SP.2007.11
-
(2007)
Proceedings of the 2007 I.E
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
5
-
-
70450172971
-
Peerson: P2p social networking: Early experiences and insights
-
SNS’09, Nuremberg
-
Buchegger S, Schioberg D, Vu LH, Datta A (2009) Peerson: P2p social networking: early experiences and insights. In: Proceedings of the second ACM EuroSys workshop on social network systems, SNS’09, Nuremberg, pp 46-52. http://doi.acm.org/10.1145/1578002.1578010
-
(2009)
Proceedings of the Second ACM Eurosys Workshop on Social Network Systems
, pp. 46-52
-
-
Buchegger, S.1
Schioberg, D.2
Vu, L.H.3
Datta, A.4
-
6
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
Cutillo L, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. Commun Mag IEEE 47(12):94-101
-
(2009)
Commun Mag IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
7
-
-
84856133401
-
On the security and feasibility of safebook: A distributed privacy-preserving online social network
-
Springer, Boston
-
Cutillo L, Molva R, Strufe T (2010) On the security and feasibility of safebook: a distributed privacy-preserving online social network. In: Privacy and identity management for life. IFIP advances in information and communication technology, vol 320. Springer, Boston, pp 86-101
-
(2010)
Privacy and Identity Management for Life. IFIP advances in Information and Communication Technology
, vol.320
, pp. 86-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
8
-
-
57949110628
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
Springer, Berlin/Heidelberg
-
Delerablee C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in cryptology ASIACRYPT 2007. Lecture notes in computer science, vol 4833. Springer, Berlin/Heidelberg, pp 200-215
-
(2007)
Advances in Cryptology ASIACRYPT 2007. Lecture Notes in computer science
, vol.4833
, pp. 200-215
-
-
Delerablee, C.1
-
9
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
Springer, Berlin/Heidelberg
-
Delerablee C, Paillier P, Pointcheval D (2007) Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys. In: Pairing-based cryptography pairing 2007. Lecture notes in computer science, vol 4575. Springer, Berlin/Heidelberg, pp 39-59
-
(2007)
Pairing-Based cryptography pairing 2007. Lecture Notes in Computer Science
, vol.4575
, pp. 39-59
-
-
Delerablee, C.1
Paillier, P.2
Pointcheval, D.3
-
11
-
-
85076889619
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
OSDI), Vancouver
-
Enck W, Gilbert P, Chun BG, Cox LP, Jung J, McDaniel P, Sheth AN (2010) Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX symposium on operating systems design and implementation (OSDI), Vancouver
-
(2010)
Proceedings of the 9Th USENIX Symposium on Operating Systems Design and Implementation
-
-
Enck, W.1
Gilbert, P.2
Chun, B.G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
13
-
-
34547273527
-
Waters b (2006) attribute-based encryption for fine-grained access control of encrypted data
-
ACM, New York
-
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security, CCS’06. ACM, New York, pp 89-98
-
Proceedings of the 13Th ACM Conference on computer and Communications Security, CCS’06
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
-
20
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for ssl
-
ACM, New York
-
Gupta V, Gupta S, Chang S, Stebila D. (2002) Performance analysis of elliptic curve cryptography for ssl. In: Proceedings of the 1st ACM workshop on wireless security, WiSE’02. ACM, New York, pp 87-94
-
Proceedings of the 1St ACM Workshop on Wireless Security, WiSE’02
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
Stebila, D.4
-
21
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
Springer, Berlin
-
Ibraimi L, Tang Q, Hartel P, Jonker W (2009) Efficient and provable secure ciphertext-policy attribute-based encryption schemes. In: Proceedings of the 5th international conference on information security practice and experience, ISPEC’09. Springer, Berlin, pp 1-12
-
(2009)
Proceedings of the 5th international conference on information security practice and experience
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
22
-
-
78650382848
-
An efficient dynamic identity-based broadcast encryption scheme
-
Jiang H, Xu Q, Shang J (2010) An efficient dynamic identity-based broadcast encryption scheme. In: Data, privacy and E-commerce (ISDPE), 2010 second international symposium on, Buffalo, pp 27-32
-
(2010)
Data, Privacy and E-Commerce (ISDPE), 2010 Second International symposium on
, pp. 27-32
-
-
Jiang, H.1
Xu, Q.2
Shang, J.3
-
23
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Springer, Berlin/Heidelberg
-
Katz J, Sahai A, Waters B (2008) Predicate encryption supporting disjunctions, polynomial equations, and inner products. In: Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on advances in cryptology, EUROCRYPT’08, Istanbul. Springer, Berlin/Heidelberg, pp 146-162
-
(2008)
Proceedings of the Theory and Applications of cryptographic techniques 27Th Annual International Conference on Advances in Cryptology, EUROCRYPT’08, Istanbul
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
24
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Springer, Berlin/Heidelberg
-
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Advances in cryptology EUROCRYPT 2010. Lecture notes in computer science, vol 6110. Springer, Berlin/Heidelberg, pp 62-91
-
(2010)
Advances in Cryptology EUROCRYPT 2010. Lecture Notes in Computer Science
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
25
-
-
0003618441
-
Report on the development of the advanced encryption standard (Aes)
-
Technical report MSU-CSE-99-39, Information Technology Laboratory, National Institute of Standards and Technology
-
Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (2000) Report on the development of the advanced encryption standard (aes). Technical report MSU-CSE-99-39, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. http://csrc.nist.gov/archive/aes/round2/r2report.pdf
-
(2000)
Computer Security Division
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
27
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
CCS’07. ACM, New York
-
Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security, CCS’07. ACM, New York, pp 195-203. http://doi.acm.org/10.1145/1315245.1315270
-
(2007)
Proceedings of the 14Th ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
28
-
-
70350649061
-
Predicate privacy in encryption systems
-
Springer, Berlin/ Heidelberg
-
Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In: Proceedings of the 6th theory of cryptography conference on theory of cryptography, TCC’09. Springer, Berlin/ Heidelberg, pp 457-473
-
(2009)
Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, TCC’09
, pp. 457-473
-
-
Shen, E.1
Shi, E.2
Waters, B.3
-
29
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Springer, Berlin/Heidelberg
-
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography PKC 2011. Lecture notes in computer science, vol 6571. Springer, Berlin/Heidelberg, pp 53-70
-
(2011)
Public Key Cryptography PKC 2011. Lecture Notes in computer science
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
30
-
-
77958605406
-
Identity-based broadcast encryption with recipient privacy
-
Chengdu
-
Zhang W, Xu Q, He P (2010) Identity-based broadcast encryption with recipient privacy. In: 3rd IEEE international conference on Computer science and information technology (ICCSIT 2010), vol 8, Chengdu, pp 483-487
-
(2010)
3Rd IEEE International Conference on Computer Science and Information technology (ICCSIT 2010)
, vol.8
, pp. 483-487
-
-
Zhang, W.1
Xu, Q.2
He, P.3
|