You are here

Bibliography

Export 1152 results:
Author Title [ Type(Desc)] Year
Book
Neumann A, Aichele CE, Lindner M. B.A.T.M.A.N Status Report.; 2007.
Levy HM. Capability-Based Computer Systems. Newton, MA, USA: Butterworth-Heinemann; 1984. Available from: http://portal.acm.org/citation.cfm?id=538134#
Cramton P, Shoham Y, Steinberg R. Combinatorial Auctions. Cambridge, MA: MIT Press; 2006 p. 649. Available from: http://works.bepress.com/cramton/35
Hurwicz L, Reiter S. Designing Economics Mechanisms. Cambridge, U.K.: Cambridge University Press; 2006.
Campo C, García-Rubio C. DNS-Based Service Discovery in Ad Hoc Networks: Evaluation and Improvements. Springer Berlin / Heidelberg; 2006. Available from: http://www.springerlink.com/content/m8322m1006416270/
Menezes AJ. Elliptic Curve Public Key Cryptosystems. Springer; 1993 p. 144. Available from: http://books.google.com/books/about/Elliptic_curve_public_key_cryptosystems.html?id=bIb54ShKS68C
Menezes FM, Monteiro PK. An Introduction to Auction Theory. 1stst ed. Oxford University Press; 2004 p. 199. Available from: http://www.oxfordscholarship.com/view/10.1093/019927598X.001.0001/acprof-9780199275984
Kendall G, Yao X, Ching SY. The Iterated Prisoner's Dilemma: 20 Years On. Singapore: World Scientific Publishing Co. Pte. Ltd.; 2007 p. 262.
Oram A. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. Sebastopol, CA, USA: O'Reilly & Associates, Inc.; 2001. Available from: http://portal.acm.org/citation.cfm?id=558412#
Aggarwal CC, Yu PS. Privacy-Preserving Data Mining: Models and Algorithms. Springer US; 2008.
von Neumann J, Morgenstern O. The Theory of Games and Economic Behavior. 60thth ed. Princeton, New Jersey, USA: Princeton University Press; 1944 p. 776. Available from: http://www.archive.org/details/theoryofgamesand030098mbp
Laffont J-J, Martimort D. The Theory of Incentives: The Principal-Agent Model. Princeton, New Jersey, USA: Princeton University Press; 2001 p. 360. Available from: http://press.princeton.edu/chapters/i7311.html
Conn AR, Gould NIM, Toint PL. Trust-region methods. Philadelphia, PA: Society for Industrial and Applied Mathematics and Mathematical Programming Society; 2000. Available from: http://books.google.com/books?hl=es&lr=&id=5kNC4fqssYQC&oi=fnd&pg=PR15&dq=trust-region+methods&ots=j1JMMQ3QJY&sig=ncLlD3mqZ4KEQ1Z9V2qId4rNffo#v=onepage&q&f=false
Book Chapter
Devet C, Goldberg I. The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 63-82. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_4
Alaggan M, Gambs S, Kermarrec A-M. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters. In: Richa AW, Scheideler C Stabilization, Safety, and Security of Distributed Systems. Vol. 7596. Stabilization, Safety, and Security of Distributed Systems. Springer Berlin Heidelberg; 2012. pp. 202-216. Available from: http://dx.doi.org/10.1007/978-3-642-33536-5_20
Chatzikokolakis K, Andrés ME, Bordenabe NE, Palamidessi C. Broadening the Scope of Differential Privacy Using Metrics. In: De Cristofaro E, Wright M Privacy Enhancing Technologies. Vol. 7981. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2013. pp. 82-102. Available from: http://dx.doi.org/10.1007/978-3-642-39077-7_5
Fuhrmann T. Combining Virtual and Physical Structures for Self-organized Routing. In: Self-Organizing Systems. Vol. Volume 4124/2006. Self-Organizing Systems. ; 2006. Available from: http://www.springerlink.com/content/4540535t4v2g2548/
Dwork C. Differential Privacy. In: Bugliesi M, Preneel B, Sassone V, Wegener I Automata, Languages and Programming. Vol. 4052. Automata, Languages and Programming. Springer Berlin Heidelberg; 2006. pp. 1-12. Available from: http://dx.doi.org/10.1007/11787006_1
Dodis Y, López-Alt A, Mironov I, Vadhan S. Differential Privacy with Imperfect Randomness. In: Safavi-Naini R, Canetti R Advances in Cryptology – CRYPTO 2012. Vol. 7417. Advances in Cryptology – CRYPTO 2012. Springer Berlin Heidelberg; 2012. pp. 497-516. Available from: http://dx.doi.org/10.1007/978-3-642-32009-5_29
Wehrle K, Götz S, Rieche S. Distributed Hash Tables. In: Peer-to-Peer Systems and Applications. Vol. 3485. Peer-to-Peer Systems and Applications. Springer; 2005.
Oya S, Troncoso C, Pérez-González F. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 204-223. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_11
Danezis G, Diaz C, Troncoso C, Laurie B. Drac: An Architecture for Anonymous Low-Volume Communications. In: Atallah MJ, Hopper NJ Privacy Enhancing Technologies. Vol. 6205. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2010. pp. 202-219. Available from: http://dx.doi.org/10.1007/978-3-642-14527-8_12
Chen T, Boreli R, Kaafar M-A, Friedman A. On the Effectiveness of Obfuscation Techniques in Online Social Networks. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 42-62. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_3
Freedman MJ, Nissim K, Pinkas B. Efficient Private Matching and Set Intersection. In: Cachin C, Camenisch JL Advances in Cryptology - EUROCRYPT 2004. Vol. 3027. Advances in Cryptology - EUROCRYPT 2004. Springer Berlin Heidelberg; 2004. pp. 1-19. Available from: http://dx.doi.org/10.1007/978-3-540-24676-3_1
Bustos-Jiménez J, Bersano N, Schaeffer SE, Piquer JM, Iosup A, Ciuffoletti A. Estimating The Size Of Peer-To-Peer Networks Using Lambert’s W Function. In: Grid Computing - Achievements and Prospects. Grid Computing - Achievements and Prospects. New York, NY, USA: Springer-Verlag; 2008. pp. 61-72. Available from: http://eprints.adm.unipi.it/649/

Pages