|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5036 occurrences of 2430 keywords
|
|
|
Results
Found 14779 publication records. Showing 14779 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Susan Hohenberger, Stephen A. Weis |
Honest-Verifier Private Disjointness Testing Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 277-294, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login |
68 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
Distributed Private Matching and Set Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 347-360, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
private matching, private set operation, homomorphic encryption |
67 | Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
Private Itemset Support Counting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 97-111, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
private frequent itemset mining, private itemset support counting, private subset inclusion test, privacy-preserving data mining |
59 | Clemente Galdi, Pino Persiano |
Private Computation with Shared Randomness over Broadcast Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 244-257, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Secure Distributed Protocols, Private Function Evaluation, Broadcast Channel |
56 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 1-12, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | John Bethencourt, Dawn Xiaodong Song, Brent Waters |
New Techniques for Private Stream Searching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 16:1-16:32, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private stream searching, public key program obfuscation, Bloom filter, private information retrieval |
49 | Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 336-353, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
universal circuits, secure evaluation of private functions, private data classification, neural networks, privacy |
49 | Sanjeev Kumar Mishra, Palash Sarkar 0001 |
Symmetrically Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 225-236, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption |
48 | Andris Ambainis, Michele Mosca, Alain Tapp, Ronald de Wolf |
Private Quantum Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pp. 547-553, 2000, IEEE Computer Society, 0-7695-0850-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
private quantum channels, classical private key, insecure one-way quantum channel, private communication, one-time pad encryption scheme, cryptography, quantum computing, qubits, quantum information |
46 | Giovanni Di Crescenzo |
Private Selective Payment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 72-89, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Jan Camenisch, Gregory M. Zaverucha |
Private Intersection of Certified Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 108-127, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
private set intersection, certified sets, secure two-party computation |
45 | Pu Li, H. Raghav Rao |
An examination of private intermediaries' roles in software vulnerabilities disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 531-539, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Private intermediary, Disclosure, Software vulnerability |
45 | David P. Woodruff, Jessica Staddon |
Private inference control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 188-197, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
oblivious transfer, private information retrieval, inference control |
45 | Dawn N. Jutla, Peter Bodorik, Deyun Gao |
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 100-117, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Privacy Web Services, Private Data Management, P3P |
45 | Anna Gál, Adi Rosén |
Lower bounds on the amount of randomness in private computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 659-666, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
lower bounds, randomness, private computation |
44 | Markus Hinkelmann, Andreas Jakoby, Peer Stechert |
t-Private and t-Secure Auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(5), pp. 694-710, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multi-party private and secure computation, garbled circuits, private auctions |
44 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 155-169, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
44 | Eyal Kushilevitz, Rafail Ostrovsky |
Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 38th Annual Symposium on Foundations of Computer Science, FOCS '97, Miami Beach, Florida, USA, October 19-22, 1997, pp. 364-373, 1997, IEEE Computer Society, 0-8186-8197-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
computationally private information retrieval, computational private information retrieval problem, quadratic residuosity assumption, information retrieval, communication complexity, data replication |
42 | Helger Lipmaa |
An Oblivious Transfer Protocol with Log-Squared Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 314-328, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer |
41 | Dan Feldman, Amos Fiat, Haim Kaplan, Kobbi Nissim |
Private coresets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 361-370, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, differential privacy, coresets |
41 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 227-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
40 | Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Practical Secure Evaluation of Semi-private Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 89-106, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology |
40 | Y. Pardhasaradhi, Safdar Ahmed |
Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 357-365, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency |
40 | Ehab Moustafa |
Public-private partnership in managing labor market in UAE - case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 1st International Conference on Theory and Practice of Electronic Governance, ICEGOV 2007, Macao, China, December 10-13, 2007, pp. 165-168, 2007, ACM, 978-1-59593-822-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
PPP, business innovations, governance model, parallel organization, private public partnership, e-government, change management, strategic planning, business transformation |
40 | Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
On Private Scalar Product Computation for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 104-120, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
private scalar product protocol, vertically partitioned frequent pattern mining, Privacy-preserving data mining |
37 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 2(1), pp. 1-20, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
36 | Robert S. Garfinkel, Ram D. Gopal, Manuel A. Nunez, Daniel O. Rice |
Secure electronic markets for private information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 36(3), pp. 461-471, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Ram D. Gopal, Robert S. Garfinkel, Manuel A. Nunez, Daniel O. Rice |
Electronic Markets for Private Information: Economic and Security Considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Eu-Jin Goh, Philippe Golle |
Event Driven Private Counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 313-327, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Seungbong Park, Jaemin Han, Jongsoo Yoon |
The New Perspective on Private Cyber Coins in Electronic Commerce: A Korean Case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings, pp. 297-305, 2005, Springer, 3-540-28467-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jie Fan, Guang-le Yan |
The System Dynamics Research on the Private Cars' Amount in Beijing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 628-639, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Private cars’ amount in Beijing, Social economic modeling, Policy simulation and control, System dynamics |
35 | Anton Joha, Marijn Janssen |
Comparing strategic intents for public-private partnerships, outsourcing and shared services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 283-292, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships |
35 | Peter Mork, Kenneth P. Smith, Barbara T. Blaustein, Chris Wolf, Keri Sarver |
Facilitating discovery on the private web using dataset digests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2008 - The Tenth International Conference on Information Integration and Web-based Applications Services, 24-26 November 2008, Linz, Austria, pp. 451-455, 2008, ACM, 978-1-60558-349-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dataset discovery, private web, search engine, structured data, disclosure |
35 | Lars Arge, Michael T. Goodrich, Michael J. Nelson 0002, Nodari Sitchinava |
Fundamental parallel algorithms for private-cache chip multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2008: Proceedings of the 20th Annual ACM Symposium on Parallelism in Algorithms and Architectures, Munich, Germany, June 14-16, 2008, pp. 197-206, 2008, ACM, 978-1-59593-973-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
parallel external memory, pem, private-cache cmp |
35 | Amos Beimel |
On private computation in incomplete networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 19(3), pp. 237-252, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Incomplete communication networks, Connectivity, Private computation |
35 | Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb |
Private approximation of search problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 119-128, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private approximation, solution-list algorithm, vertex cover, secure computation |
35 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 223-240, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
35 | Helger Lipmaa |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 416-433, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption |
35 | T. R. N. Rao, Kil-Hyun Nam |
Private-Key Algebraic-Coded Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 35-48, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack |
34 | Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan |
Registration and Private Key Distribution Protocol Based on IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCST ![In: Fifth International Conference on Frontier of Computer Science and Technology, FCST 2010, Changchun, Jilin Province, China, August 18-22, 2010, pp. 420-423, 2010, IEEE Computer Society, 978-0-7695-4139-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption |
34 | Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert |
A Cryptographically t-Private Auction System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Third International Conference on Network and System Security, NSS 2009, Gold Coast, Queensland, Australia, October 19-21, 2009, pp. 44-51, 2009, IEEE Computer Society, 978-0-7695-3838-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multiparty private computation, garbled circuits, private auctions |
34 | Meera Balakrishnan, Andrew L. Reibman |
Reliability Models for Fault-Tolerant Private Network Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 43(9), pp. 1039-1053, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
telephone networks, lumped parameter networks, fault-tolerant private network applications, corporate network, leased private lines, repair strategies, call level, approximate Markov model, lumped model, coverage parameter estimation, reliability, reliability, fault tolerant computing, parameter estimation, Markov processes, network simulation, system recovery, telecommunication network routing, reliability models, state-space model, state-space methods, time-scales, application level, dynamic rerouting |
34 | Benny Chor, Mihály Geréb-Graus, Eyal Kushilevitz |
Private Computations Over the Integers (Extended Abstract) ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume I, pp. 335-344, 1990, IEEE Computer Society, 0-8186-2082-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
countable domains, private distributed computations, t-private Boolean functions, finite domains |
34 | Liqiang Geng, Larry Korba, Xin Wang 0004, Yunli Wang, Hongyu Liu, Yonghua You |
Using Data Mining Methods to Predict Personally Identifiable Information in Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 4th International Conference, ADMA 2008, Chengdu, China, October 8-10, 2008. Proceedings, pp. 272-281, 2008, Springer, 978-3-540-88191-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Martin Tomitsch, Thomas Grechenig, Pia Wascher |
Personal and private calendar interfaces support private patterns: diaries, relations, emotional expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordiCHI ![In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction 2006, Oslo, Norway, October 14-18, 2006, pp. 401-404, 2006, ACM, 1-59593-325-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
personal scheduling, private calendars, emotional, diaries |
33 | Nabeel Hassan, Md. Mahfuzur Rahman, Pourang Irani, Peter Graham |
Chucking: A One-Handed Document Sharing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (2) ![In: Human-Computer Interaction - INTERACT 2009, 12th IFIP TC 13 International Conference, Uppsala, Sweden, August 24-28, 2009, Proceedings, Part II, pp. 264-278, 2009, Springer, 978-3-642-03657-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Chucking, Flicking, public-to-private document sharing, multi-document environments (MDEs) |
33 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007, pp. 60-63, 2007, ACM, 978-1-59593-883-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
33 | Da-Wei Wang 0004, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu |
Information Theoretical Analysis of Two-Party Secret Computation. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 310-317, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy Analysis, Scalar Product, Private Computation |
33 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 190-209, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
32 | Ruben Merz, Jean-Yves Le Boudec |
Performance Evaluation of Impulse Radio UWB Networks Using Common or Private Acquisition Preambles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 8(7), pp. 865-879, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 |
Self-enforcing Private Inference Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 260-274, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
self-enforcing, database, Inference control |
32 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 90-107, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, Jaihie Kim |
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 38(5), pp. 1302-1313, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Ramy Tannious, Aria Nosratinia |
Relay Channel With Private Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(10), pp. 3777-3785, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh |
Proposal of a method for protecting private information in user context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2006 International Symposium on Applications and the Internet Workshops (SAINT 2006 Workshops), 23-27 January 2006, Phoenix, Arizona, USA, pp. 138-141, 2006, IEEE Computer Society, 0-7695-2510-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Taketoshi Ushiama, Toyohide Watanabe |
An Automatic Indexing Approach for Private Photo Searching Based on E-mail Archive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part II, pp. 1111-1118, 2006, Springer, 3-540-46537-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Taisya Krivoruchko, James Diamond, Jeff Hooper |
Storing RSA Private Keys In Your Head. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA, pp. 129-138, 2006, IEEE Computer Society, 0-7695-2724-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won |
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 215-226, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
D-OCSP, D-OCSP-KIS, OCSP Responder, hash function |
32 | Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya |
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 433-442, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Michael Langberg |
Private Codes or Succinct Random Codes That Are (Almost) Perfect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 45th Symposium on Foundations of Computer Science (FOCS 2004), 17-19 October 2004, Rome, Italy, Proceedings, pp. 325-334, 2004, IEEE Computer Society, 0-7695-2228-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang 0005 |
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 16-30, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann |
Efficiency Improvements of the Private Message Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pp. 112-125, 2001, Springer, 3-540-42733-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Preuß, Jens-Hagen Syrbe, Hartmut König |
Virtual Private Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 24-26 October 1997, Gold Coast, Australia, Proceedings, pp. 216-226, 1997, IEEE Computer Society, 0-8186-8031-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
32 | Tony Savor, Rudolph E. Seviora |
Improving the efficiency of supervision by software through state aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Real Time Technology and Applications Symposium ![In: 1st IEEE Real-Time Technology and Applications Symposium, Chicago, Illinois, USA, May 15-17, 1995, pp. 202-211, 1995, IEEE Computer Society, 0-8186-6980-2. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
private telephone exchanges, supervisory software, software supervision, real time failure detection, real time system monitoring, running time complexity, specification processes, software supervisor, ITU Specification and Description Language, small private branch telephone exchange, SDL processes, telecom switching software, real-time systems, computational complexity, formal specification, fault diagnosis, telecommunication computing, state transitions, telecommunication control, computerised monitoring, inputs queues, state aggregation |
31 | Vibhor Rastogi, Suman Nath |
Differentially private aggregation of distributed time-series with transformation and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 735-746, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distributed noise addition, output perturbation, participatory data mining, time-series data, private data analysis |
31 | Julien Bringer, Hervé Chabanne |
Another Look at Extended Private Information Retrieval Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 305-322, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Private Information Retrieval (PIR), Extended PIR (EPIR), Batching, Polynomial Evaluation |
31 | Thomas H. Morris, V. S. S. Nair |
Privacy Protected ELF for Private Computing on Public Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 452-457, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed computing security, private computing on public platforms, grid security |
31 | Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, Kian-Lee Tan |
Private queries in location based services: anonymizers are not necessary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 10-12, 2008, pp. 121-132, 2008, ACM, 978-1-60558-102-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
query privacy, private information retrieval, location anonymity |
31 | Ryousei Takano, Motohiko Matsuda, Tomohiro Kudoh, Yuetsu Kodama, Fumihiro Okazaki, Yutaka Ishikawa, Yasufumi Yoshizawa |
High Performance Relay Mechanism for MPI Communication Libraries Run on Multiple Private IP Address Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 401-408, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IMPI, Private IP address clusters, Grid computing, MPI |
31 | Josep Domingo-Ferrer |
A Public-Key Protocol for Social Networks with Private Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decisions for Artificial Intelligence, 4th International Conference, MDAI 2007, Kitakyushu, Japan, August 16-18, 2007, Proceedings, pp. 373-379, 2007, Springer, 978-3-540-73728-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Private relationships, Privacy, Social networks, Public-key cryptography |
31 | Yitao Duan, John F. Canny |
Practical private computation of vector addition-based functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, PODC 2007, Portland, Oregon, USA, August 12-15, 2007, pp. 326-327, 2007, ACM, 978-1-59593-616-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
L2-norm, vector addition, zero-knowledge protocol, private computation |
31 | Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith |
Smooth sensitivity and sampling in private data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 75-84, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
output perturbation, clustering, sensitivity, privacy preserving data mining, private data analysis |
31 | Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel |
Authentication anomaly detection: a case study on a virtual private network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 3rd Annual ACM Workshop on Mining Network Data, MineNet 2007, San Diego, California, USA, June 12, 2007, pp. 17-22, 2007, ACM, 978-1-59593-792-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, authentication, anomaly detection, virtual private network |
31 | Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey |
Private Computation: k-Connected versus 1-Connected Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(3), pp. 341-357, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Connectivity, Randomness, Secure multi-party computation, Secure function evaluation, Parity, Private computation |
31 | Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma |
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 101-115, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Virtual Private Organization (VPO), Role Single Sign On (RSSO), Authority spheres, Access Control, Interoperability, Virtual Organization (VO), OrBAC |
31 | Cleidson R. B. de Souza, David F. Redmiles, Paul Dourish |
"Breaking the code", moving between private and public work in collaborative software development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GROUP ![In: Proceedings of the 2003 International ACM SIGGROUP Conference on Supporting Group Work, GROUP 2003, Sanibel Island, Florida, USA, November 9-12, 2003, pp. 105-114, 2003, ACM, 1-58113-693-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
private work, public work, qualitative studies, collaborative software development |
31 | Christian Cachin, Silvio Micali, Markus Stadler |
Computationally Private Information Retrieval with Polylogarithmic Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 402-414, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Euler's function, hiding assumption, Private information retrieval, Integer factorization |
31 | Takao Kato, Kazuhiko Omachi, Shiro Tanabe |
BVPN (Broadband Virtual Private Network): a flexible, high-speed, enterprise network architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 420-424, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Broadband Virtual Private Network, shared buffer memory switch, Distributed processing Environment, ATM, communications networks, intelligent networks, Intelligent Network, broadband networks |
30 | Ali Khoshgozaran, Cyrus Shahabi |
Private Buddy Search: Enabling Private Spatial Queries in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 166-173, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Karol Horodecki, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim |
General Paradigm for Distilling Classical Key From Quantum States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(4), pp. 1898-1929, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 619-636, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis E. Shasha |
GhostDB: querying visible and hidden data without leaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, 2007, pp. 677-688, 2007, ACM, 978-1-59593-686-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure device, privacy, storage model |
29 | Insoon Jo, Hyuck Han, Heon Young Yeom, Ohkyoung Kwon |
Universal Execution of Parallel Processes: Penetrating NATs over the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part II, pp. 577-584, 2007, Springer, 978-3-540-72585-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sabah S. Al-Fedaghi |
Security Model for Informational Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 154-155, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jichuan Chang, Gurindar S. Sohi |
Cooperative Caching for Chip Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 33rd International Symposium on Computer Architecture (ISCA 2006), June 17-21, 2006, Boston, MA, USA, pp. 264-276, 2006, IEEE Computer Society, 0-7695-2608-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Keith B. Frikken, Mikhail J. Atallah, Chen Zhang |
Privacy-preserving credit checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, BC, Canada, June 5-8, 2005, pp. 147-154, 2005, ACM, 1-59593-049-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy, e-commerce, secure protocol, secure multi-party computation |
29 | Philip D. MacKenzie, Michael K. Reiter |
Delegation of cryptographic servers for capture-resilient devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 16(4), pp. 307-327, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Frans A. Lategan, Martin S. Olivier |
A Chinese Wall Approach to Privacy Policies for the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 940-944, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Chinese Wall, Privacy, Access Control, P3P |
29 | Philip D. MacKenzie, Michael K. Reiter |
Delegation of cryptographic servers for capture-resilient devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 10-19, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Zhihui Wang 0009, Wei Wang 0009, Baile Shi, S. H. Boey |
Privacy-Preserving Frequent Pattern Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 225-236, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
private pattern, privacy preservation, Frequent pattern |
28 | Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 97-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations |
28 | Erica Robles, Abhay Sukumaran, Kathryn Rickertsen, Clifford Nass |
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2006 Conference on Human Factors in Computing Systems, CHI 2006, Montréal, Québec, Canada, April 22-27, 2006, pp. 831-839, 2006, ACM, 1-59593-372-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
evaluation, ubiquitous computing, computer-mediated communication, feedback, public, private, shared experience |
28 | Ping Lin, K. Selçuk Candan |
Secure and Privacy Preserving Outsourcing of Tree Structured Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 1-17, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Tree structured data (XML) Security, Private Information Retrieval, Search on Encrypted Data |
28 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 138-157, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
28 | Alex Galis, Stefan Covaci |
Active Virtual Provate Network Services on Demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERWORKING ![In: Next Generation Networks, Networks and Services for the Information Society, 5th IFIP TC6 International Symposium, INTERWORKING 2000, Bergen, Norway, October 3-6, 2000, Proceedings, pp. 160-173, 2000, Springer, 3-540-41140-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Miami Project, Mobile Agents, Virtual Enterprise, Virtual Private Networks, Active Services |
27 | Todd A. Anderson 0001 |
Optimizations in a private nursery-based garbage collector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMM ![In: Proceedings of the 9th International Symposium on Memory Management, ISMM 2010, Toronto, Ontario, Canada, June 5-6, 2010, pp. 21-30, 2010, ACM, 978-1-4503-0054-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
garbage collection, functional languages |
27 | Elena Zheleva, Lise Getoor |
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, April 20-24, 2009, pp. 531-540, 2009, ACM, 978-1-60558-487-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
attribute inference, privacy, social networks, groups |
27 | Alaa Aref El Masri, João Pedro Sousa |
Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 438-443, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jun Sakuma, Shigenobu Kobayashi |
Link analysis for private weighted graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceedings of the 32nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2009, Boston, MA, USA, July 19-23, 2009, pp. 235-242, 2009, ACM, 978-1-60558-483-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, ranking, link analysis, pagerank, hits |
27 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(1), pp. 6:1-6:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
Displaying result #1 - #100 of 14779 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|