-
1
-
-
17044384142
-
Language-based security
-
Abadi, M., Morrisett, G., Sabelfeld, A.: Language-based security. Journal of Functional Programming 15(2), 129 (2005)
-
(2005)
Journal of Functional Programming
, vol.15
, Issue.2
, pp. 129
-
-
Abadi, M.1
Morrisett, G.2
Sabelfeld, A.3
-
2
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation. In: Proceedings of the 25th ACM Symposium on Principles of Distributed Computing, PODC 2006 (2006)
-
(2006)
Proceedings of the 25Th ACM Symposium on Principles of Distributed Computing, PODC 2006
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
3
-
-
3142716056
-
Order preserving encryption for numeric data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the ACM International Conference on Management of Data, SIGMOD 2004 (2004)
-
(2004)
Proceedings of the ACM International Conference on Management of Data, SIGMOD 2004
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
78049411322
-
A certifying compiler for zero-knowledge proofs of knowledge based on σ-protocols
-
In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
-
Almeida, J.B., Bangerter, E., Barbosa, M., Krenn, S., Sadeghi, A.-R., Schneider, T.: A certifying compiler for zero-knowledge proofs of knowledge based on σ-protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 151–167. Springer, Heidelberg (2010)
-
(2010)
ESORICS 2010. LNCS
, vol.6345
, pp. 151-167
-
-
Almeida, J.B.1
Bangerter, E.2
Barbosa, M.3
Krenn, S.4
Sadeghi, A.-R.5
Schneider, T.6
-
5
-
-
85020254094
-
Automated synthesis of privacy-preserving distributed applications
-
Backes, M., Maffei, M., Pecina, K.: Automated synthesis of privacy-preserving distributed applications. In: Proceedings of 19th Network and Distributed System Security Symposium, NDSS 2012 (2012)
-
(2012)
Proceedings of 19Th Network and Distributed System Security Symposium, NDSS 2012
-
-
Backes, M.1
Maffei, M.2
Pecina, K.3
-
6
-
-
85076310471
-
Pretp: Privacy-preserving electronic toll pricing
-
Balasch, J., Rial, A., Troncoso, C., Preneel, B., Verbauwhede, I., Geuens, C.: Pretp: privacy-preserving electronic toll pricing. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010 (2010)
-
(2010)
Proceedings of the 19Th USENIX Conference on Security, USENIX Security 2010
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Preneel, B.4
Verbauwhede, I.5
Geuens, C.6
-
7
-
-
70350378277
-
Recognizing the use-mode of kitchen appliances from their current consumption
-
In: Barnaghi, P., Moessner, K., Presser, M., Meissner, S. (eds.), Springer, Heidelberg
-
Bauer, G., Stockinger, K., Lukowicz, P.: Recognizing the use-mode of kitchen appliances from their current consumption. In: Barnaghi, P., Moessner, K., Presser, M., Meissner, S. (eds.) EuroSSC 2009. LNCS, vol. 5741, pp. 163–176. Springer, Heidelberg (2009)
-
(2009)
Eurossc 2009. LNCS
, vol.5741
, pp. 163-176
-
-
Bauer, G.1
Stockinger, K.2
Lukowicz, P.3
-
8
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS 2008 (2008)
-
(2008)
Proceedings of the 15Th ACM Conference on Computer and Communications Security, CCS 2008
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
9
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: Proceedings of the 20th ACM Symposium on Theory of computing, STOC 1988 (1988)
-
(1988)
Proceedings of the 20Th ACM Symposium on Theory of Computing, STOC 1988
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
10
-
-
84963503600
-
Project “anonymity and unobservability in the internet”
-
Berthold, O., Federrath, H., Köhntopp, M.: Project “anonymity and unobservability in the internet”. In: Proceedings of the 10th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000 (2000)
-
(2000)
Proceedings of the 10Th Conference on Computers, Freedom and Privacy: Challenging the Assumptions, CFP 2000
-
-
Berthold, O.1
Federrath, H.2
Köhntopp, M.3
-
11
-
-
70849107602
-
Dictionary-based order-preserving string compression for main memory column stores
-
Binnig, C., Hildenbrand, S., Färber, F.: Dictionary-based order-preserving string compression for main memory column stores. In: Proceedings of the ACM International Conference on Management of Data, SIGMOD 2009 (2009)
-
(2009)
Proceedings of the ACM International Conference on Management of Data, SIGMOD 2009
-
-
Binnig, C.1
Hildenbrand, S.2
Färber, F.3
-
12
-
-
57049188348
-
Sharemind: A framework for fast privacypreserving computations
-
In: Jajodia, S., Lopez, J. (eds.), Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)
-
(2008)
ESORICS 2008. LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
13
-
-
67650690965
-
Order-preserving symmetric encryption
-
In: Joux, A. (ed.), Springer, Heidelberg
-
Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009)
-
(2009)
EUROCRYPT 2009. LNCS
, vol.5479
, pp. 224-241
-
-
Boldyreva, A.1
Chenette, N.2
Lee, Y.3
O’neill, A.4
-
14
-
-
35048901123
-
Public key encryption with keyword search
-
In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 506-522
-
-
Boneh, D.1
Di Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
16
-
-
79954610963
-
Smart privacy for the smart grid: Embedding privacy into the design of electricity conservation
-
Cavoukian, A., Polonetskyand, J., Wolf, C.: Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3(2), 275–294 (2010)
-
(2010)
Identity in the Information Society
, vol.3
, Issue.2
, pp. 275-294
-
-
Cavoukian, A.1
Polonetskyand, J.2
Wolf, C.3
-
17
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
In: Pfitzmann, B. (ed.), Springer, Heidelberg
-
Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280–300. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 280-300
-
-
Cramer, R.1
Damgård, I.B.2
Nielsen, J.B.3
-
18
-
-
67049134126
-
Asynchronous multiparty computation: Theory and implementation
-
In: Jarecki, S., Tsudik, G. (eds.), Springer, Heidelberg
-
Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160–179. Springer, Heidelberg (2009)
-
(2009)
PKC 2009. LNCS
, vol.5443
, pp. 160-179
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
Nielsen, J.B.4
-
20
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Conference on Security, USENIX Security 2004 (2004)
-
(2004)
Proceedings of the 13Th USENIX Conference on Security, USENIX Security 2004
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
23
-
-
79957974657
-
Implementing gentry’s fully-homomorphic encryption scheme
-
In: Paterson, K.G. (ed.), Springer, Heidelberg
-
Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
-
(2011)
EUROCRYPT 2011. LNCS
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
24
-
-
0003691180
-
-
Basic Applications, vol. 2. Cambridge University Press
-
Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
-
(2004)
The Foundations of Cryptography
-
-
Goldreich, O.1
-
25
-
-
0002337124
-
How to play any mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th ACM Symposium on Theory of Computing, STOC 1987 (1987)
-
(1987)
Proceedings of the 19Th ACM Symposium on Theory of Computing, STOC 1987
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
26
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186–208 (1989)
-
(1989)
SIAM Journal of Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
27
-
-
33750018128
-
Rational secret sharing, revisited
-
In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
-
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229–241. Springer, Heidelberg (2006)
-
(2006)
SCN 2006. LNCS
, vol.4116
, pp. 229-241
-
-
Gordon, S.D.1
Katz, J.2
-
29
-
-
0026970695
-
Nonintrusive appliance load monitoring
-
Hart, G.W.: Nonintrusive appliance load monitoring. Proceedings of the IEEE 80(12), 1870–1891 (1992)
-
(1992)
Proceedings of the IEEE
, vol.80
, Issue.12
, pp. 1870-1891
-
-
Hart, G.W.1
-
30
-
-
79961197957
-
-
NRC HandelsbladApril
-
Heck, W.: Smart energy meter will not be compulsory. NRC Handelsblad (April 2009), http://www.nrc.nl/international/article2207260.ece/Smart.energy.meter.will.not.be.compulsory
-
(2009)
Smart Energy Meter Will Not Be Compulsory
-
-
Heck, W.1
-
31
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
Henecka, W., Kögl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010 (2010)
-
(2010)
Proceedings of the 17Th ACM Conference on Computer and Communications Security, CCS 2010
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
32
-
-
70349149683
-
Privacy for public transportation
-
In: Danezis, G., Golle, P. (eds.), Springer, Heidelberg
-
Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1–19. Springer, Heidelberg (2006)
-
(2006)
PET 2006. LNCS
, vol.4258
, pp. 1-19
-
-
Heydt-Benjamin, T.S.1
Chae, H.-J.2
Defend, B.3
Fu, K.4
-
33
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: Proceedings of the 20th USENIX Conference on Security, USENIX Security 2011 (2011)
-
(2011)
Proceedings of the 20Th USENIX Conference on Security, USENIX Security 2011
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
34
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: Proceedings of the 46th IEEE Symposium on Foundations of Computer Science, FOCS 2005 (2005)
-
(2005)
Proceedings of the 46Th IEEE Symposium on Foundations of Computer Science, FOCS 2005
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
35
-
-
77954928042
-
-
Telegraph (UK)October
-
Jamieson, A.: Smart meters could be ‘spy in the home’. Telegraph (UK) (October 2009), http://www.telegraph.co.uk/finance/newsbysector/energy/6292809/Smart-meters-could-be-spy-in-the-home.html
-
(2009)
Smart Meters Could Be ‘spy in the home’
-
-
Jamieson, A.1
-
36
-
-
79961183580
-
Plug-in privacy for smart metering billing
-
Fischer-Hübner, S., Hopper, N. (eds.), Springer, Heidelberg
-
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
-
(2011)
PETS 2011. LNCS
, vol.6794
, pp. 192-210
-
-
Jawurek, M.1
Johns, M.2
Kerschbaum, F.3
-
40
-
-
77249154055
-
Inferring personal information from demand-response systems
-
Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Security and Privacy 8(1), 11–20 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.1
, pp. 11-20
-
-
Lisovich, M.A.1
Mulligan, D.K.2
Wicker, S.B.3
-
41
-
-
33749541500
-
Rationality and adversarial behavior in multi-party computation
-
In: Dwork, C. (ed.), Springer, Heidelberg
-
Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180–197. Springer, Heidelberg (2006)
-
(2006)
CRYPTO 2006. LNCS
, vol.4117
, pp. 180-197
-
-
Lysyanskaya, A.1
Triandopoulos, N.2
-
42
-
-
85084163840
-
Fairplay – a secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay – a secure two-party computation system. In: Proceedings of the 13th USENIX Conference on Security, USENIX Security 2004 (2004)
-
(2004)
Proceedings of the 13Th USENIX Conference on Security, USENIX Security 2004
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
43
-
-
80955157888
-
Can homomorphic encryption be practical? In
-
Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In. In: Proceedings of the 3rd ACM Cloud Computing Security Workshop, CCSW 2011 (2011)
-
(2011)
Proceedings of the 3Rd ACM Cloud Computing Security Workshop, CCSW 2011
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
44
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
In: Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
45
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP 2011 (2011)
-
(2011)
Proceedings of the 23Rd ACM Symposium on Operating Systems Principles, SOSP 2011
-
-
Popa, R.A.1
Redfield, C.2
Zeldovich, N.3
Balakrishnan, H.4
-
48
-
-
80054976361
-
L1 – an intermediate language for mixed-protocol secure computation
-
Schröpfer, A., Kerschbaum, F., Müller, G.: L1 – an intermediate language for mixed-protocol secure computation. In: Proceedings of the 35th IEEE Computer Software and Applications Conference, COMPSAC 2011 (2011)
-
(2011)
Proceedings of the 35Th IEEE Computer Software and Applications Conference, COMPSAC 2011
-
-
Schröpfer, A.1
Kerschbaum, F.2
Müller, G.3
-
49
-
-
34548774576
-
Multi-dimensional range query over encrypted data
-
Shi, E., Bethencourt, J., Chan, T.-H.H., Song, D., Perrig, A.: Multi-dimensional range query over encrypted data. In: Proceedings of the IEEE Symposium on Security and Privacy, SP 2007 (2007)
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy, SP 2007
-
-
Shi, E.1
Bethencourt, J.2
Chan, T.-H.H.3
Song, D.4
Perrig, A.5
-
50
-
-
25444462746
-
Non-cooperative computation: Boolean functions with correctness and exclusivity
-
Shoham, Y., Tennenholtz, M.: Non-cooperative computation: boolean functions with correctness and exclusivity. Theoretical Computer Science 343(1-2), 97–113 (2005)
-
(2005)
Theoretical Computer Science
, vol.343
, Issue.1-2
, pp. 97-113
-
-
Shoham, Y.1
Tennenholtz, M.2
-
51
-
-
0026237284
-
Using appliance signatures for monitoring residential loads at meter panel level
-
Sultanem, F.: Using appliance signatures for monitoring residential loads at meter panel level. IEEE Transactions on Power Delivery 6(4), 1380–1385 (1991)
-
(1991)
IEEE Transactions on Power Delivery
, vol.6
, Issue.4
, pp. 1380-1385
-
-
Sultanem, F.1
|