You are here

Bibliography

Export 14 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is cryptography  [Clear All Filters]
2011
Dreier J, Kerschbaum F. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. In: PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. Boston, Massachusetts, USA: IEEE Computer Society; 2011. pp. 916-924.
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
2009
Melchor CA, Ait-Salem B, Gaborit P. A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. In: Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. ; 2009.
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
2008
Ben-David A, Nisan N, Pinkas B. FairplayMP: a system for secure multi-party computation. In: CCS'08 - Proceedings of the 15th ACM conference on Computer and communications security. CCS'08 - Proceedings of the 15th ACM conference on Computer and communications security. Alexandria, VA, USA: ACM; 2008. pp. 257–266. Available from: http://doi.acm.org/10.1145/1455770.1455804
2006
Shaneck M, Kim Y, Kumar V. Privacy Preserving Nearest Neighbor Search. In: Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. ; 2006.
Brands S. Secure User Identification Without Privacy Erosion. University of Ottawa Law & Technology Journal [Internet]. 2006 ;3:205–223. Available from: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999695
Kutzner K, Wallenta C, Fuhrmann T. Securing the Scalable Source Routing Protocol. In: Proceedings of the World Telecommunications Congress 2006. Proceedings of the World Telecommunications Congress 2006. Budapest, Hungary; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2005
Wang X, Yin YL, Yu H. Finding Collisions in the Full SHA-1. In: In Proceedings of Crypto. In Proceedings of Crypto. Springer; 2005. pp. 17–36. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.4261
Garcia FD, Hasuo I, Pieters W, van Rossum P. Provable Anonymity. In: Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05). Proceedings of the 3rd ACM Workshop on Formal Methods in Security Engineering (FMSE05). Alexandria, VA, USA; 2005. Available from: http://portal.acm.org/citation.cfm?id=1103576.1103585
2000
Buttyán L, Hubaux J-P. Enforcing service availability in mobile ad-hoc WANs. In: MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing. MobiHoc '00: Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing. Piscataway, NJ, USA: IEEE Press; 2000. pp. 87–96. Available from: http://portal.acm.org/citation.cfm?id=514164
1976
Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory. 1976 ;22(6):644-654.