-
2
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. Stankovic, and D. Wagner. Security in Wireless Sensor Networks. Communications of the ACM, 47(6):53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
5
-
-
85084014165
-
Orthogonal security with cipherbase
-
A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal Security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR), 2013.
-
(2013)
Conference on Innovative Data Systems Research (CIDR)
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Kaushik, R.4
Kossmann, D.5
Ramamurthy, R.6
Venkatesan, R.7
-
8
-
-
0003945449
-
-
PhD thesis, Yale University, Department of Computer Science
-
J. Benaloh. Verifiable Secret-Ballot Elections. PhD thesis, 1988. Yale University, Department of Computer Science.
-
(1988)
Verifiable Secret-ballot Elections
-
-
Benaloh, J.1
-
11
-
-
84954262791
-
Private database queries using somewhat homomorphic encryption
-
D. Boneh, C. Gentry, S. Halevi, F. Wang, and D. J. Wu. Private Database Queries Using Somewhat Homomorphic Encryption. In Applied Cryptography and Network Security (ACNS), 2013.
-
(2013)
Applied Cryptography and Network Security (ACNS)
-
-
Boneh, D.1
Gentry, C.2
Halevi, S.3
Wang, F.4
Wu, D.J.5
-
13
-
-
84995384373
-
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
-
D. Boneh, K. Lewi, M. Raykova, A. Sahai, M. Zhandry, and J. Zimmerman. Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. In EUROCRYPT, 2015.
-
(2015)
EUROCRYPT
-
-
Boneh, D.1
Lewi, K.2
Raykova, M.3
Sahai, A.4
Zhandry, M.5
Zimmerman, J.6
-
18
-
-
33947301544
-
Contiki - A lightweight and flexible operating system for tiny networked sensors
-
A. Dunkels, B. Grönvall, and T. Voigt. Contiki - a Lightweight and Flexible Operating System for Tiny Networked Sensors. In IEEE LCN, 2004.
-
(2004)
IEEE LCN
-
-
Dunkels, A.1
Grönvall, B.2
Voigt, T.3
-
22
-
-
84989338883
-
Answering aggregation queries in a secure system model
-
T. Ge and S. Zdonik. Answering Aggregation Queries in a Secure System Model. In Very Large Data Bases (VLDB), 2007.
-
(2007)
Very Large Data Bases (VLDB)
-
-
Ge, T.1
Zdonik, S.2
-
23
-
-
77649261628
-
-
PhD thesis, Stanford University: AAI3382729, Advisor: Dan Boneh
-
C. Gentry. A Fully Homomorphic Encryption Scheme. PhD thesis, 2009. Stanford University: AAI3382729, Advisor: Dan Boneh.
-
(2009)
A Fully Homomorphic Encryption Scheme
-
-
Gentry, C.1
-
27
-
-
84879821906
-
Reusable garbled circuits and succinct functional encryption
-
S. Goldwasser, Y. Kalai, R. A. Popa, V. Vaikuntanathan, and N. Zeldovich. Reusable Garbled Circuits and Succinct Functional Encryption. In Annual ACM Symposium on Theory of Computing (STOC), 2013.
-
(2013)
Annual ACM Symposium on Theory of Computing (STOC)
-
-
Goldwasser, S.1
Kalai, Y.2
Popa, R.A.3
Vaikuntanathan, V.4
Zeldovich, N.5
-
30
-
-
84895539842
-
The OAuth 2.0 authorization framework
-
D. Hardt. The OAuth 2.0 Authorization Framework. In RFC 6749, 2012.
-
(2012)
RFC 6749
-
-
Hardt, D.1
-
32
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: Tool for Automating Secure Two-party Computations. In ACM Computer and Communications Security (CCS), 2010.
-
(2010)
ACM Computer and Communications Security (CCS)
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
35
-
-
84921046600
-
Delegation-based Authentication and Authorization for the IP-based Internet of Things
-
R. Hummen, H. Shafagh, S. Raza, T. Voigt, and K. Wehrle. Delegation-based Authentication and Authorization for the IP-based Internet of Things. In IEEE Sensor and Ad Hoc Communications and Networks (SECON), 2014.
-
(2014)
IEEE Sensor and Ad Hoc Communications and Networks (SECON)
-
-
Hummen, R.1
Shafagh, H.2
Raza, S.3
Voigt, T.4
Wehrle, K.5
-
37
-
-
84962887773
-
A generalisation, a simplification and some applications of Pailliers probabilistic public-key system
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Pailliers probabilistic public-key system. In Workshop on Practice and Theory in Public-Key Cryptography, 1992.
-
(1992)
Workshop on Practice and Theory in Public-key Cryptography
-
-
Damgård, I.1
Jurik, M.2
-
40
-
-
84875313714
-
Mapping an arbitrary message to an elliptic curve when defined over GF (2n)
-
B. King. Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF (2n). International Journal of Network Security, 8(2):169-176, 2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 169-176
-
-
King, B.1
-
41
-
-
84875543622
-
Low power or high performance? A tradeoff whose time has come (and nearly gone)
-
J. Ko, K. Klues, C. Richter, W. Hofer, B. Kusy, M. Bruenig, T. Schmid, Q. Wang, P. Dutta, and A. Terzis. Low Power or High Performance? A Tradeoff Whose Time Has Come (and Nearly Gone). In Embedded Wireless Systems and Networks (EWSN), 2012.
-
(2012)
Embedded Wireless Systems and Networks (EWSN)
-
-
Ko, J.1
Klues, K.2
Richter, C.3
Hofer, W.4
Kusy, B.5
Bruenig, M.6
Schmid, T.7
Wang, Q.8
Dutta, P.9
Terzis, A.10
-
42
-
-
84876758390
-
Flocklab: A testbed for distributed, synchronized tracing and profiling of wireless embedded systems
-
R. Lim, F. Ferrari, M. Zimmerling, C. Walser, P. Sommer, and J. Beutel. FlockLab: A Testbed for Distributed, Synchronized Tracing and Profiling of Wireless Embedded Systems. In ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN), 2013.
-
(2013)
ACM/IEEE Conference on Information Processing in Sensor Networks (IPSN)
-
-
Lim, R.1
Ferrari, F.2
Zimmerling, M.3
Walser, C.4
Sommer, P.5
Beutel, J.6
-
48
-
-
0003979335
-
-
Basic Applications. Cambridge University Press
-
Oded Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Oded Goldreich1
-
49
-
-
53149149860
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
P. Szczechowiak, L. Oliveira, M. Scott, M. Collier, and R. Dahab. NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In Embedded Wireless Systems and Networks (EWSN), 2008.
-
(2008)
Embedded Wireless Systems and Networks (EWSN)
-
-
Szczechowiak, P.1
Oliveira, L.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
50
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
54
-
-
85076880634
-
Building web applications on top of encrypted data using mylar
-
R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan. Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2014.
-
(2014)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Popa, R.A.1
Stark, E.2
Valdez, S.3
Helfer, J.4
Zeldovich, N.5
Balakrishnan, H.6
-
58
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
Springer
-
B. Schneier. Description of a new variable-length key, 64-bit block cipher (Blowfish). Fast Software Encryption, Springer, 1994.
-
(1994)
Fast Software Encryption
-
-
Schneier, B.1
-
59
-
-
84954220466
-
Poster: Towards encrypted query processing for the Internet of things
-
H. Shafagh, A. Hithnawi, A. Dröscher, S. Duquennoy, and W. Hu. Poster: Towards Encrypted Query Processing for the Internet of Things. In ACM International Conference on Mobile Computing and Networking (MobiCom), 2015.
-
(2015)
ACM International Conference on Mobile Computing and Networking (MobiCom)
-
-
Shafagh, H.1
Hithnawi, A.2
Dröscher, A.3
Duquennoy, S.4
Hu, W.5
-
60
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based Cryptosystems and Signature Schemes. In Advances in Cryptology (CRYPTO), 1984.
-
(1984)
Advances in Cryptology (CRYPTO)
-
-
Shamir, A.1
-
61
-
-
0000211152
-
Class number, a theory of factorization, and genera
-
D. Shanks. Class Number, a Theory of Factorization, and Genera. In Symposium Mathematical Society, 1971.
-
(1971)
Symposium Mathematical Society
-
-
Shanks, D.1
|