-
1
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
Pfitzmann, B. (ed.), Springer, Heidelberg
-
Aiello, W., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 119–135. Springer, Heidelberg (2001)
-
(2001)
EUROCRYPT 2001. LNCS
, vol.2045
, pp. 119-135
-
-
Aiello, W.1
Ishai, Y.2
Reingold, O.3
-
2
-
-
84859950107
-
Multiparty computation with low communication, computation and interaction via threshold FHE
-
Pointcheval, D., Johansson, T. (eds.), Springer, Heidelberg
-
Asharov, G., Jain, A., López-Alt, A., Tromer, E., Vaikuntanathan, V., Wichs, D.: Multiparty computation with low communication, computation and interaction via threshold FHE. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 483–501. Springer, Heidelberg (2012)
-
(2012)
EUROCRYPT 2012. LNCS
, vol.7237
, pp. 483-501
-
-
Asharov, G.1
Jain, A.2
López-Alt, A.3
Tromer, E.4
Vaikuntanathan, V.5
Wichs, D.6
-
3
-
-
80755143980
-
Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
-
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G.: Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In: CCS, pp. 691–702 (2011)
-
(2011)
CCS
, vol.691-702
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
4
-
-
0036294828
-
Universal arguments and their applications
-
Barak, B., Goldreich, O.: Universal arguments and their applications. In: CCC (2002)
-
(2002)
CCC
-
-
Barak, B.1
Goldreich, O.2
-
5
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: CCS (2008)
-
(2008)
CCS
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
6
-
-
57049188348
-
Sharemind: A framework for fast privacypreserving computations
-
Jajodia, S., Lopez, J. (eds.), Springer, Heidelberg
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)
-
(2008)
ESORICS 2008. LNCS
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
7
-
-
77955146714
-
Kr?gaard, M., Nielsen, J., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live
-
Bogetoft, P., Christensen, D., Damgard, I., Geisler, M., Jakobsen, T., Kr?gaard, M., Nielsen, J., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure multiparty computation goes live. In: FC (2009)
-
(2009)
FC
-
-
Bogetoft, P.1
Christensen, D.2
Damgard, I.3
Geisler, M.4
Jakobsen, T.5
-
8
-
-
0035879575
-
A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl
-
Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires’ problem. Discrete Appl. Math. 111(1), 23–36 (2001)
-
(2001)
Math
, vol.111
, Issue.1
, pp. 23-36
-
-
Boudot, F.1
Schoenmakers, B.2
Traore, J.3
-
9
-
-
70350400269
-
Private intersection of certified sets
-
Camenisch, J., Zaverucha, G.: Private intersection of certified sets. In: FC, pp. 108–127 (2009)
-
(2009)
FC
, pp. 108-127
-
-
Camenisch, J.1
Zaverucha, G.2
-
10
-
-
84884472579
-
Highlyscalable searchable symmetric encryption with support for boolean queries
-
Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Rou, M.-C., Steiner, M.: Highlyscalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353– 373. Springer, Heidelberg (2013)
-
(2013)
CRYPTO 2013, Part I. LNCS
, vol.8042
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.3
Krawczyk, H.4
Rou, M.-C.5
Steiner, M.6
-
11
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
Ioannidis, J., Keromytis, A.D., Yung, M. (eds.), Springer, #x00A0;Heidelberg
-
Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442–455. Springer, Heidelberg (2005)
-
(2005)
ACNS 2005. LNCS
, vol.3531
, pp. 442-455
-
-
Chang, Y.-C.1
Mitzenmacher, M.2
-
12
-
-
78650834524
-
Structured encryption and controlled disclosure
-
Abe, M. (ed.), Springer, Heidelberg
-
Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577–594. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 577-594
-
-
Chase, M.1
Kamara, S.2
-
13
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: STOC, pp. 364–369 (1986)
-
(1986)
STOC
, vol.364-369
-
-
Cleve, R.1
-
14
-
-
77955318017
-
Practical private set intersection protocols with linear complexity
-
De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Financial Cryptography, pp. 143–159 (2010)
-
(2010)
Financial Cryptography
, vol.143-159
-
-
De Cristofaro, E.1
Tsudik, G.2
-
15
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: ACM CCS, pp. 79–88 (2006)
-
(2006)
ACM CCS
, vol.79-88
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
16
-
-
68949136946
-
Efficient robust private set intersection
-
Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.), Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125–142. Springer, Heidelberg (2009)
-
(2009)
ACNS 2009. LNCS
, vol.5536
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
17
-
-
79959306358
-
Secure efficient multiparty computing of multivariate polynomials and applications
-
Lopez, J., Tsudik, G. (eds.), Springer, Heidelberg
-
Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Secure efficient multiparty computing of multivariate polynomials and applications. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 130–146. Springer, Heidelberg (2011)
-
(2011)
ACNS 2011. LNCS
, vol.6715
, pp. 130-146
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
18
-
-
85000877110
-
-
Wei Dai. Crypto++ library
-
Wei Dai. Crypto++ library. http://www.cryptopp.com/ (2013)
-
(2013)
-
-
-
19
-
-
80051631839
-
Kr?gaard, M., Nielsen, J.-B.: Asynchronous multiparty computation: Theory and implementation
-
Damgard, I., Geisler, M., Kr?gaard, M., Nielsen, J.-B.: Asynchronous multiparty computation: Theory and implementation. In: PKC (2009)
-
(2009)
PKC
-
-
Damgard, I.1
Geisler, M.2
-
20
-
-
33745124039
-
Constant-Round multiparty computation using a blackbox pseudorandom generator
-
Shoup, V. (ed.), Springer, Heidelberg
-
Damgård, I.B., Ishai, Y.: Constant-Round multiparty computation using a blackbox pseudorandom generator. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 378–394. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 378-394
-
-
Damgård, I.B.1
Ishai, Y.2
-
21
-
-
51849125042
-
Kr?gaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience
-
., Wagner, D. (ed.), Springer, Heidelberg
-
Damgård, I., Ishai, Y., Kr?gaard, M., Nielsen, J.B., Smith, A.: Scalable multiparty computation with nearly optimal work and resilience. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 241–261. Springer, Heidelberg (2008)
-
(2008)
CRYPTO 2008. LNCS
, vol.5157
, pp. 241-261
-
-
Damgård, I.1
Ishai, Y.2
-
22
-
-
78650834525
-
Linear-complexity private set intersection protocols secure in malicious model
-
Abe, M. (ed.), Springer, Heidelberg
-
De Cristofaro, E., Kim, J., Tsudik, G.: Linear-complexity private set intersection protocols secure in malicious model. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 213–231. Springer, Heidelberg (2010)
-
(2010)
ASIACRYPT 2010. LNCS
, vol.6477
, pp. 213-231
-
-
De Cristofaro, E.1
Kim, J.2
Tsudik, G.3
-
23
-
-
84863221426
-
Experimenting with fast private set intersection
-
Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.), Springer, Heidelberg
-
De Cristofaro, E., Tsudik, G.: Experimenting with fast private set intersection. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 55–73. Springer, Heidelberg (2012)
-
(2012)
Trust 2012. LNCS
, vol.7344
, pp. 55-73
-
-
De Cristofaro, E.1
Tsudik, G.2
-
24
-
-
84903690859
-
-
Report 2012/252
-
Dong, C., Chen, L., Camenisch, J., Russello, G.: Fair private set intersection witha semi-trusted arbiter. Cryptology ePrint Archive, Report 2012/252 (2012)
-
(2012)
Fair private set intersection witha semi-trusted arbiter. Cryptology ePrint Archive
-
-
Dong, C.1
Chen, L.2
Camenisch, J.3
Russello, G.4
-
25
-
-
84888990465
-
When private set intersection meets big data: An efficient and scalable protocol
-
Dong, C., Chen, L., Wen, Z.: When private set intersection meets big data: An efficient and scalable protocol. In: ACM CCS, pp. 789–800 (2013)
-
(2013)
ACM CCS
, pp. 789-800
-
-
Dong, C.1
Chen, L.2
Wen, Z.3
-
26
-
-
84881230403
-
-
SCAPI
-
Ejgenberg, Y., Farbstein, M., Levy, M., Yehuda, L.: The secure computation application programming interface, SCAPI (2012)
-
(2012)
The secure computation application programming interface
-
-
Ejgenberg, Y.1
Farbstein, M.2
Levy, M.3
Yehuda, L.4
-
27
-
-
85000702243
-
-
Sparsehash library, Accessed 08 May
-
Donovan, H., et al.: Sparsehash library. https://code.google.com/p/sparsehash/ (2013). Accessed 08 May 2013
-
(2013)
-
-
Donovan, H.1
-
28
-
-
0030150177
-
Comparing information without leaking it. Commun
-
Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Commun. ACM 39(5), 77–85 (1996)
-
(1996)
ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
29
-
-
79956328170
-
A minimal model for secure computation (extended abstract)
-
Feige, U., Killian, J., Naor, M.: A minimal model for secure computation (extended abstract). In: STOC (1994)
-
(1994)
STOC
-
-
Feige, U.1
Killian, J.2
Naor, M.3
-
30
-
-
79951794503
-
Secure set intersection with untrusted hardware tokens
-
Kiayias, A. (ed.), Springer, Heidelberg
-
Fischlin, M., Pinkas, B., Sadeghi, A.-R., Schneider, T., Visconti, I.: Secure set intersection with untrusted hardware tokens. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 1–16. Springer, Heidelberg (2011)
-
(2011)
CT-RSA 2011. LNCS
, vol.6558
, pp. 1-16
-
-
Fischlin, M.1
Pinkas, B.2
Sadeghi, A.-R.3
Schneider, T.4
Visconti, I.5
-
31
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1–19. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
32
-
-
33745536762
-
Resource fairness and composability of cryptographic protocols
-
Halevi, S., Rabin, T. (eds.), Springer, Heidelberg
-
Garay, J.A., MacKenzie, P.D., Prabhakaran, M., Yang, K.: Resource fairness and composability of cryptographic protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 404–428. Springer, Heidelberg (2006)
-
(2006)
TCC 2006. LNCS
, vol.3876
, pp. 404-428
-
-
Garay, J.A.1
Mackenzie, P.D.2
Prabhakaran, M.3
Yang, K.4
-
33
-
-
84884200669
-
Multiparty proximity testing with dishonest majority from equality testing
-
Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.), Springer, Heidelberg
-
Gelles, R., Ostrovsky, R., Winoto, K.: Multiparty proximity testing with dishonest majority from equality testing. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012, Part II. LNCS, vol. 7392, pp. 537–548. Springer, Heidelberg (2012)
-
(2012)
ICALP 2012, Part II. LNCS
, vol.7392
, pp. 537-548
-
-
Gelles, R.1
Ostrovsky, R.2
Winoto, K.3
-
34
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC (2009)
-
(2009)
STOC
-
-
Gentry, C.1
-
36
-
-
77954649870
-
Partial fairness in secure two-party computation
-
Gilbert, H. (ed.), Springer, Heidelberg
-
Gordon, S.D., Katz, J.: Partial fairness in secure two-party computation. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 157–176. Springer, Heidelberg (2010)
-
(2010)
EUROCRYPT 2010. LNCS
, vol.6110
, pp. 157-176
-
-
Gordon, S.D.1
Katz, J.2
-
37
-
-
84855248474
-
Complete fairness in secure twoparty computation
-
Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure twoparty computation. J. ACM 58(6), 24 (2011)
-
(2011)
J. ACM
, vol.58
, Issue.6
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
38
-
-
70349276910
-
Constructions of truly practical secure protocols using standardsmartcards
-
Hazay, C., Lindell, Y.: Constructions of truly practical secure protocols using standardsmartcards. In: CCS, pp. 491–500 (2008)
-
(2008)
CCS
, pp. 491-500
-
-
Hazay, C.1
Lindell, Y.2
-
39
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
Canetti, R. (ed.), Springer, Heidelberg
-
Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155–175. Springer, Heidelberg (2008)
-
(2008)
TCC 2008. LNCS
, vol.4948
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
40
-
-
77958060842
-
Efficient set operations in the presence of malicious adversaries. Public Key Cryptogr
-
Hazay, C., Nissim, K.: Efficient set operations in the presence of malicious adversaries. Public Key Cryptogr. PKC 2010, 312–331 (2010)
-
(2010)
PKC
, vol.2010
, pp. 312-331
-
-
Hazay, C.1
Nissim, K.2
-
41
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
Henecka, W., Kogl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: CCS (2010)
-
(2010)
CCS
-
-
Henecka, W.1
Kogl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
42
-
-
84914127581
-
Faster secure two-party computation using garbled circuits
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security (2011)
-
(2011)
USENIX Security
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
43
-
-
85168150014
-
Private set intersection: Are garbled circuits better than custom protocols?
-
Huang, Y., Evans, D., Katz, J.: Private set intersection: Are garbled circuits better than custom protocols? In: NDSS (2012)
-
(2012)
NDSS
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
-
44
-
-
77958056561
-
Fast secure computation of set intersection
-
In: Garay, J.A., De Prisco, R. (eds.), Springer, Heidelberg
-
Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418–435. Springer, Heidelberg (2010)
-
(2010)
SCN 2010. LNCS
, vol.6280
, pp. 418-435
-
-
Jarecki, S.1
Liu, X.2
-
45
-
-
84856450939
-
-
Technical Report 2011/272, IACR ePrint Cryptography Archive
-
Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multi-party comptuation. Technical Report 2011/272, IACR ePrint Cryptography Archive (2011)
-
(2011)
Outsourcing multi-party comptuation
-
-
Kamara, S.1
Mohassel, P.2
Raykova, M.3
-
48
-
-
84869441394
-
Salus: A system for server-aided secure function evaluation
-
Kamara, S., Mohassel, P., Riva, B.: Salus: A system for server-aided secure function evaluation. In: CCS, pp. 797–808 (2012)
-
(2012)
CCS
, pp. 797-808
-
-
Kamara, S.1
Mohassel, P.2
Riva, B.3
-
49
-
-
33745130227
-
Round efficiency of multi-party computation with a dishonest majority
-
Katz, J., Ostrovsky, R., Smith, A.: Round efficiency of multi-party computation with a dishonest majority. In: EUROCRYPT (2003)
-
(2003)
EUROCRYPT
-
-
Katz, J.1
Ostrovsky, R.2
Smith, A.3
-
50
-
-
84871965745
-
Outsourcing private set intersection using homomorphic encryption
-
Kerschbaum, F.: Outsourcing private set intersection using homomorphic encryption. In: Asia CCS ’12 (2012)
-
(2012)
Asia CCS ’12
-
-
Kerschbaum, F.1
-
51
-
-
33745160750
-
Privacy-preserving set operations
-
In: Shoup, V. (ed.), Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241–257. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005. LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
53
-
-
35048833033
-
Parallel coin-tossing and constant-round secure two-party computation
-
Kilian, J. (ed.), Springer, Heidelberg
-
Lindell, Y.: Parallel coin-tossing and constant-round secure two-party computation. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 171. Springer, Heidelberg (2001)
-
(2001)
CRYPTO 2001. LNCS
, vol.2139
-
-
Lindell, Y.1
-
54
-
-
0345058962
-
Verifiable homomorphic oblivious transfer and private equality test
-
Laih, C.-S. (ed.), Springer, Heidelberg
-
Lipmaa, H.: Verifiable homomorphic oblivious transfer and private equality test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416–433. Springer, Heidelberg (2003)
-
(2003)
ASIACRYPT 2003. LNCS
, vol.2894
, pp. 416-433
-
-
Lipmaa, H.1
-
55
-
-
80755168310
-
Vmcrypt: Modular software architecture for scalable secure computation
-
Malka, L.: Vmcrypt: modular software architecture for scalable secure computation. In: CCS (2011)
-
(2011)
CCS
-
-
Malka, L.1
-
56
-
-
85084163840
-
Fairplay–a secure two-party computation system
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay–a secure two-party computation system. In: USENIX Security (2004)
-
(2004)
USENIX Security
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
57
-
-
85059753615
-
Botgrep: Finding P2P bots with structured graph analysis
-
Nagaraja, S., Mittal, P., Hong, C.-Y., Caesar, M., Borisov, N.: Botgrep: Finding P2P bots with structured graph analysis. In: USENIX Security (2010)
-
(2010)
USENIX Security
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
58
-
-
85150485002
-
Location privacy via private proximity testing
-
Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Dan B.: Location privacy via private proximity testing. In: NDSS (2011)
-
(2011)
NDSS
-
-
Narayanan, A.1
Thiagarajan, N.2
Lakhani, M.3
Hamburg, M.4
Dan, B.5
-
59
-
-
38049154921
-
Fair secure two-party computation
-
Pinkas, B.: Fair secure two-party computation. In: Eurocrypt, pp. 647–647 (2003)
-
(2003)
Eurocrypt
-
-
Pinkas, B.1
-
60
-
-
85000787550
-
-
Redis windows port, Accessed 08 May 2013
-
Rawas, H.: Redis windows port. https://github.com/MSOpenTech/redis (2013). Accessed 08 May 2013
-
(2013)
-
-
Rawas, H.1
-
61
-
-
84879548566
-
Private proximity testing with an untrusted server
-
Saldamli, G., Chow, R., Jin, H., Knijnenburg, B.: Private proximity testing with an untrusted server. In: SIGSAC, pp. 113–118 (2013)
-
(2013)
SIGSAC
, pp. 113-118
-
-
Saldamli, G.1
Chow, R.2
Jin, H.3
Knijnenburg, B.4
-
62
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
Song, D., Wagner, D., Perrig, A.: Practical techniques for searching on encrypted data. In: IEEE S&P, pp. 44–55 (2000)
-
(2000)
IEEE S&P
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
63
-
-
85000653762
-
-
hiredis win32, Accessed 08 May 2013
-
Yaguang, T.: hiredis win32. https://github.com/texnician/hiredis-win32 (2013). Accessed 08 May 2013
-
(2013)
-
-
Yaguang, T.1
-
64
-
-
0020312165
-
Protocols for secure computations
-
Yao, A.: Protocols for secure computations. In: FOCS (1982)
-
(1982)
FOCS
-
-
Yao, A.1
|