The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for private with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1975 (19) 1976-1980 (19) 1981-1983 (19) 1984-1985 (30) 1986-1987 (29) 1988 (18) 1989 (22) 1990 (22) 1991 (22) 1992 (27) 1993 (17) 1994 (40) 1995 (39) 1996 (40) 1997 (54) 1998 (60) 1999 (102) 2000 (136) 2001 (195) 2002 (219) 2003 (301) 2004 (362) 2005 (503) 2006 (609) 2007 (630) 2008 (578) 2009 (546) 2010 (296) 2011 (308) 2012 (387) 2013 (430) 2014 (401) 2015 (454) 2016 (516) 2017 (556) 2018 (666) 2019 (849) 2020 (986) 2021 (1180) 2022 (1371) 2023 (1422) 2024 (299)
Publication types (Num. hits)
article(6342) book(8) data(2) incollection(79) inproceedings(8233) phdthesis(112) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5036 occurrences of 2430 keywords

Results
Found 14779 publication records. Showing 14779 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
86Susan Hohenberger, Stephen A. Weis Honest-Verifier Private Disjointness Testing Without Random Oracles. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login
68Qingsong Ye, Huaxiong Wang, Josef Pieprzyk Distributed Private Matching and Set Operations. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF private matching, private set operation, homomorphic encryption
67Sven Laur, Helger Lipmaa, Taneli Mielikäinen Private Itemset Support Counting. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF private frequent itemset mining, private itemset support counting, private subset inclusion test, privacy-preserving data mining
59Clemente Galdi, Pino Persiano Private Computation with Shared Randomness over Broadcast Channel. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure Distributed Protocols, Private Function Evaluation, Broadcast Channel
56Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49John Bethencourt, Dawn Xiaodong Song, Brent Waters New Techniques for Private Stream Searching. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private stream searching, public key program obfuscation, Bloom filter, private information retrieval
49Ahmad-Reza Sadeghi, Thomas Schneider 0003 Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF universal circuits, secure evaluation of private functions, private data classification, neural networks, privacy
49Sanjeev Kumar Mishra, Palash Sarkar 0001 Symmetrically Private Information Retrieval. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption
48Andris Ambainis, Michele Mosca, Alain Tapp, Ronald de Wolf Private Quantum Channels. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF private quantum channels, classical private key, insecure one-way quantum channel, private communication, one-time pad encryption scheme, cryptography, quantum computing, qubits, quantum information
46Giovanni Di Crescenzo Private Selective Payment Protocols. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
45Jan Camenisch, Gregory M. Zaverucha Private Intersection of Certified Sets. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private set intersection, certified sets, secure two-party computation
45Pu Li, H. Raghav Rao An examination of private intermediaries' roles in software vulnerabilities disclosure. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Private intermediary, Disclosure, Software vulnerability
45David P. Woodruff, Jessica Staddon Private inference control. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF oblivious transfer, private information retrieval, inference control
45Dawn N. Jutla, Peter Bodorik, Deyun Gao Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Privacy Web Services, Private Data Management, P3P
45Anna Gál, Adi Rosén Lower bounds on the amount of randomness in private computation. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF lower bounds, randomness, private computation
44Markus Hinkelmann, Andreas Jakoby, Peer Stechert t-Private and t-Secure Auctions. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-party private and secure computation, garbled circuits, private auctions
44Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang Efficient Disjointness Tests for Private Datasets. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Set Disjointness, Private Matching, Secure Multi-Party Computation
44Eyal Kushilevitz, Rafail Ostrovsky Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF computationally private information retrieval, computational private information retrieval problem, quadratic residuosity assumption, information retrieval, communication complexity, data replication
42Helger Lipmaa An Oblivious Transfer Protocol with Log-Squared Communication. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer
41Dan Feldman, Amos Fiat, Haim Kaplan, Kobbi Nissim Private coresets. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, differential privacy, coresets
41Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
40Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Practical Secure Evaluation of Semi-private Functions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology
40Y. Pardhasaradhi, Safdar Ahmed Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency
40Ehab Moustafa Public-private partnership in managing labor market in UAE - case study. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF PPP, business innovations, governance model, parallel organization, private public partnership, e-government, change management, strategic planning, business transformation
40Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen On Private Scalar Product Computation for Privacy-Preserving Data Mining. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private scalar product protocol, vertically partitioned frequent pattern mining, Privacy-preserving data mining
37Philip D. MacKenzie, Michael K. Reiter Networked cryptographic devices resilient to capture. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices
36Robert S. Garfinkel, Ram D. Gopal, Manuel A. Nunez, Daniel O. Rice Secure electronic markets for private information. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Ram D. Gopal, Robert S. Garfinkel, Manuel A. Nunez, Daniel O. Rice Electronic Markets for Private Information: Economic and Security Considerations. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Eu-Jin Goh, Philippe Golle Event Driven Private Counters. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Seungbong Park, Jaemin Han, Jongsoo Yoon The New Perspective on Private Cyber Coins in Electronic Commerce: A Korean Case. Search on Bibsonomy EC-Web The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Jie Fan, Guang-le Yan The System Dynamics Research on the Private Cars' Amount in Beijing. Search on Bibsonomy Complex (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Private cars’ amount in Beijing, Social economic modeling, Policy simulation and control, System dynamics
35Anton Joha, Marijn Janssen Comparing strategic intents for public-private partnerships, outsourcing and shared services. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships
35Peter Mork, Kenneth P. Smith, Barbara T. Blaustein, Chris Wolf, Keri Sarver Facilitating discovery on the private web using dataset digests. Search on Bibsonomy iiWAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dataset discovery, private web, search engine, structured data, disclosure
35Lars Arge, Michael T. Goodrich, Michael J. Nelson 0002, Nodari Sitchinava Fundamental parallel algorithms for private-cache chip multiprocessors. Search on Bibsonomy SPAA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF parallel external memory, pem, private-cache cmp
35Amos Beimel On private computation in incomplete networks. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Incomplete communication networks, Connectivity, Private computation
35Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb Private approximation of search problems. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private approximation, solution-list algorithm, vertex cover, secure computation
35Rafail Ostrovsky, William E. Skeith III Private Searching on Streaming Data. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation
35Helger Lipmaa Verifiable Homomorphic Oblivious Transfer and Private Equality Test. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption
35T. R. N. Rao, Kil-Hyun Nam Private-Key Algebraic-Coded Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack
34Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan Registration and Private Key Distribution Protocol Based on IBE. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption
34Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert A Cryptographically t-Private Auction System. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiparty private computation, garbled circuits, private auctions
34Meera Balakrishnan, Andrew L. Reibman Reliability Models for Fault-Tolerant Private Network Applications. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1994 DBLP  DOI  BibTeX  RDF telephone networks, lumped parameter networks, fault-tolerant private network applications, corporate network, leased private lines, repair strategies, call level, approximate Markov model, lumped model, coverage parameter estimation, reliability, reliability, fault tolerant computing, parameter estimation, Markov processes, network simulation, system recovery, telecommunication network routing, reliability models, state-space model, state-space methods, time-scales, application level, dynamic rerouting
34Benny Chor, Mihály Geréb-Graus, Eyal Kushilevitz Private Computations Over the Integers (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF countable domains, private distributed computations, t-private Boolean functions, finite domains
34Liqiang Geng, Larry Korba, Xin Wang 0004, Yunli Wang, Hongyu Liu, Yonghua You Using Data Mining Methods to Predict Personally Identifiable Information in Emails. Search on Bibsonomy ADMA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Martin Tomitsch, Thomas Grechenig, Pia Wascher Personal and private calendar interfaces support private patterns: diaries, relations, emotional expressions. Search on Bibsonomy NordiCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF personal scheduling, private calendars, emotional, diaries
33Nabeel Hassan, Md. Mahfuzur Rahman, Pourang Irani, Peter Graham Chucking: A One-Handed Document Sharing Technique. Search on Bibsonomy INTERACT (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Chucking, Flicking, public-to-private document sharing, multi-document environments (MDEs)
33Steven Gevers, Kristof Verslype, Bart De Decker Enhancing privacy in identity management systems. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF microsoft cardspace, private credentials, security, privacy, identity managment systems
33Da-Wei Wang 0004, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu Information Theoretical Analysis of Two-Party Secret Computation. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy Analysis, Scalar Product, Private Computation
33Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia Point-Based Trust: Define How Much Privacy Is Worth. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private multi-party computation, Trust management, knapsack problem
32Ruben Merz, Jean-Yves Le Boudec Performance Evaluation of Impulse Radio UWB Networks Using Common or Private Acquisition Preambles. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 Self-enforcing Private Inference Control. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-enforcing, database, Inference control
32Stanislaw Jarecki, Xiaomin Liu Private Mutual Authentication and Conditional Oblivious Transfer. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, Jaihie Kim A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Ramy Tannious, Aria Nosratinia Relay Channel With Private Messages. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh Proposal of a method for protecting private information in user context. Search on Bibsonomy SAINT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Taketoshi Ushiama, Toyohide Watanabe An Automatic Indexing Approach for Private Photo Searching Based on E-mail Archive. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Taisya Krivoruchko, James Diamond, Jeff Hooper Storing RSA Private Keys In Your Head. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF D-OCSP, D-OCSP-KIS, OCSP Responder, hash function
32Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Michael Langberg Private Codes or Succinct Random Codes That Are (Almost) Perfect. Search on Bibsonomy FOCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang 0005 Private Keyword-Based Push and Pull with Applications to Anonymous Communication. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann Efficiency Improvements of the Private Message Service. Search on Bibsonomy Information Hiding The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Thomas Preuß, Jens-Hagen Syrbe, Hartmut König Virtual Private Resources. Search on Bibsonomy EDOC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Tony Savor, Rudolph E. Seviora Improving the efficiency of supervision by software through state aggregation. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF private telephone exchanges, supervisory software, software supervision, real time failure detection, real time system monitoring, running time complexity, specification processes, software supervisor, ITU Specification and Description Language, small private branch telephone exchange, SDL processes, telecom switching software, real-time systems, computational complexity, formal specification, fault diagnosis, telecommunication computing, state transitions, telecommunication control, computerised monitoring, inputs queues, state aggregation
31Vibhor Rastogi, Suman Nath Differentially private aggregation of distributed time-series with transformation and encryption. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed noise addition, output perturbation, participatory data mining, time-series data, private data analysis
31Julien Bringer, Hervé Chabanne Another Look at Extended Private Information Retrieval Protocols. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Private Information Retrieval (PIR), Extended PIR (EPIR), Batching, Polynomial Evaluation
31Thomas H. Morris, V. S. S. Nair Privacy Protected ELF for Private Computing on Public Platforms. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed computing security, private computing on public platforms, grid security
31Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, Kian-Lee Tan Private queries in location based services: anonymizers are not necessary. Search on Bibsonomy SIGMOD Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF query privacy, private information retrieval, location anonymity
31Ryousei Takano, Motohiko Matsuda, Tomohiro Kudoh, Yuetsu Kodama, Fumihiro Okazaki, Yutaka Ishikawa, Yasufumi Yoshizawa High Performance Relay Mechanism for MPI Communication Libraries Run on Multiple Private IP Address Clusters. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IMPI, Private IP address clusters, Grid computing, MPI
31Josep Domingo-Ferrer A Public-Key Protocol for Social Networks with Private Relationships. Search on Bibsonomy MDAI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Private relationships, Privacy, Social networks, Public-key cryptography
31Yitao Duan, John F. Canny Practical private computation of vector addition-based functions. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF L2-norm, vector addition, zero-knowledge protocol, private computation
31Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith Smooth sensitivity and sampling in private data analysis. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF output perturbation, clustering, sensitivity, privacy preserving data mining, private data analysis
31Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel Authentication anomaly detection: a case study on a virtual private network. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, data mining, authentication, anomaly detection, virtual private network
31Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey Private Computation: k-Connected versus 1-Connected Networks. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Connectivity, Randomness, Secure multi-party computation, Secure function evaluation, Parity, Private computation
31Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma O2O: Virtual Private Organizations to Manage Security Policy Interoperability. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Virtual Private Organization (VPO), Role Single Sign On (RSSO), Authority spheres, Access Control, Interoperability, Virtual Organization (VO), OrBAC
31Cleidson R. B. de Souza, David F. Redmiles, Paul Dourish "Breaking the code", moving between private and public work in collaborative software development. Search on Bibsonomy GROUP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF private work, public work, qualitative studies, collaborative software development
31Christian Cachin, Silvio Micali, Markus Stadler Computationally Private Information Retrieval with Polylogarithmic Communication. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Euler's function, hiding assumption, Private information retrieval, Integer factorization
31Takao Kato, Kazuhiko Omachi, Shiro Tanabe BVPN (Broadband Virtual Private Network): a flexible, high-speed, enterprise network architecture. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Broadband Virtual Private Network, shared buffer memory switch, Distributed processing Environment, ATM, communications networks, intelligent networks, Intelligent Network, broadband networks
30Ali Khoshgozaran, Cyrus Shahabi Private Buddy Search: Enabling Private Spatial Queries in Social Networks. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Karol Horodecki, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim General Paradigm for Distilling Classical Key From Quantum States. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis E. Shasha GhostDB: querying visible and hidden data without leaks. Search on Bibsonomy SIGMOD Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure device, privacy, storage model
29Insoon Jo, Hyuck Han, Heon Young Yeom, Ohkyoung Kwon Universal Execution of Parallel Processes: Penetrating NATs over the Grid. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Sabah S. Al-Fedaghi Security Model for Informational Privacy. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jichuan Chang, Gurindar S. Sohi Cooperative Caching for Chip Multiprocessors. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Keith B. Frikken, Mikhail J. Atallah, Chen Zhang Privacy-preserving credit checking. Search on Bibsonomy EC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, e-commerce, secure protocol, secure multi-party computation
29Philip D. MacKenzie, Michael K. Reiter Delegation of cryptographic servers for capture-resilient devices. Search on Bibsonomy Distributed Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Frans A. Lategan, Martin S. Olivier A Chinese Wall Approach to Privacy Policies for the Web. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Chinese Wall, Privacy, Access Control, P3P
29Philip D. MacKenzie, Michael K. Reiter Delegation of cryptographic servers for capture-resilient devices. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Zhihui Wang 0009, Wei Wang 0009, Baile Shi, S. H. Boey Privacy-Preserving Frequent Pattern Sharing. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF private pattern, privacy preservation, Frequent pattern
28Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations
28Erica Robles, Abhay Sukumaran, Kathryn Rickertsen, Clifford Nass Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF evaluation, ubiquitous computing, computer-mediated communication, feedback, public, private, shared experience
28Ping Lin, K. Selçuk Candan Secure and Privacy Preserving Outsourcing of Tree Structured Data. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Tree structured data (XML) Security, Private Information Retrieval, Search on Encrypted Data
28Steven R. Johnston Development of a Legal Framework for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception
28Alex Galis, Stefan Covaci Active Virtual Provate Network Services on Demand. Search on Bibsonomy INTERWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Miami Project, Mobile Agents, Virtual Enterprise, Virtual Private Networks, Active Services
27Todd A. Anderson 0001 Optimizations in a private nursery-based garbage collector. Search on Bibsonomy ISMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF garbage collection, functional languages
27Elena Zheleva, Lise Getoor To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute inference, privacy, social networks, groups
27Alaa Aref El Masri, João Pedro Sousa Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Jun Sakuma, Shigenobu Kobayashi Link analysis for private weighted graphs. Search on Bibsonomy SIGIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, ranking, link analysis, pagerank, hits
27Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia Private Information: To Reveal or not to Reveal. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authorization, policies, secure multi-party computation
Displaying result #1 - #100 of 14779 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license