|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5036 occurrences of 2430 keywords
|
|
|
Results
Found 14779 publication records. Showing 14779 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Susan Hohenberger, Stephen A. Weis |
Honest-Verifier Private Disjointness Testing Without Random Oracles. |
Privacy Enhancing Technologies |
2006 |
DBLP DOI BibTeX RDF |
private disjointness testing, private intersection cardinality, subgroup decision assumption, private data mining, anonymous login |
68 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
Distributed Private Matching and Set Operations. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
private matching, private set operation, homomorphic encryption |
67 | Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
Private Itemset Support Counting. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
private frequent itemset mining, private itemset support counting, private subset inclusion test, privacy-preserving data mining |
59 | Clemente Galdi, Pino Persiano |
Private Computation with Shared Randomness over Broadcast Channel. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Secure Distributed Protocols, Private Function Evaluation, Broadcast Channel |
56 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
49 | John Bethencourt, Dawn Xiaodong Song, Brent Waters |
New Techniques for Private Stream Searching. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
private stream searching, public key program obfuscation, Bloom filter, private information retrieval |
49 | Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
universal circuits, secure evaluation of private functions, private data classification, neural networks, privacy |
49 | Sanjeev Kumar Mishra, Palash Sarkar 0001 |
Symmetrically Private Information Retrieval. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Private Information retrieval (PIR), Symmetrically Private Information Retrieval (SPIR), Quadratic Residuacity Assumption (QRA), Cryptographic Protocols, Probabilistic Encryption |
48 | Andris Ambainis, Michele Mosca, Alain Tapp, Ronald de Wolf |
Private Quantum Channels. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
private quantum channels, classical private key, insecure one-way quantum channel, private communication, one-time pad encryption scheme, cryptography, quantum computing, qubits, quantum information |
46 | Giovanni Di Crescenzo |
Private Selective Payment Protocols. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
45 | Jan Camenisch, Gregory M. Zaverucha |
Private Intersection of Certified Sets. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
private set intersection, certified sets, secure two-party computation |
45 | Pu Li, H. Raghav Rao |
An examination of private intermediaries' roles in software vulnerabilities disclosure. |
Inf. Syst. Frontiers |
2007 |
DBLP DOI BibTeX RDF |
Private intermediary, Disclosure, Software vulnerability |
45 | David P. Woodruff, Jessica Staddon |
Private inference control. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
oblivious transfer, private information retrieval, inference control |
45 | Dawn N. Jutla, Peter Bodorik, Deyun Gao |
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
Privacy Web Services, Private Data Management, P3P |
45 | Anna Gál, Adi Rosén |
Lower bounds on the amount of randomness in private computation. |
STOC |
2003 |
DBLP DOI BibTeX RDF |
lower bounds, randomness, private computation |
44 | Markus Hinkelmann, Andreas Jakoby, Peer Stechert |
t-Private and t-Secure Auctions. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
multi-party private and secure computation, garbled circuits, private auctions |
44 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
44 | Eyal Kushilevitz, Rafail Ostrovsky |
Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. |
FOCS |
1997 |
DBLP DOI BibTeX RDF |
computationally private information retrieval, computational private information retrieval problem, quadratic residuosity assumption, information retrieval, communication complexity, data replication |
42 | Helger Lipmaa |
An Oblivious Transfer Protocol with Log-Squared Communication. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer |
41 | Dan Feldman, Amos Fiat, Haim Kaplan, Kobbi Nissim |
Private coresets. |
STOC |
2009 |
DBLP DOI BibTeX RDF |
privacy, differential privacy, coresets |
41 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
40 | Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Practical Secure Evaluation of Semi-private Functions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology |
40 | Y. Pardhasaradhi, Safdar Ahmed |
Efficiency of electronic public service delivery in India: public-private partnership as a critical factor. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
Bhoomi, e-Seva, e-governance practices, public private collaboration, efficiency |
40 | Ehab Moustafa |
Public-private partnership in managing labor market in UAE - case study. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
PPP, business innovations, governance model, parallel organization, private public partnership, e-government, change management, strategic planning, business transformation |
40 | Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
On Private Scalar Product Computation for Privacy-Preserving Data Mining. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
private scalar product protocol, vertically partitioned frequent pattern mining, Privacy-preserving data mining |
37 | Philip D. MacKenzie, Michael K. Reiter |
Networked cryptographic devices resilient to capture. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Private key protection, Key disabling, Cryptographic protocols, Passwords, Networked devices |
36 | Robert S. Garfinkel, Ram D. Gopal, Manuel A. Nunez, Daniel O. Rice |
Secure electronic markets for private information. |
IEEE Trans. Syst. Man Cybern. Part A |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Ram D. Gopal, Robert S. Garfinkel, Manuel A. Nunez, Daniel O. Rice |
Electronic Markets for Private Information: Economic and Security Considerations. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Eu-Jin Goh, Philippe Golle |
Event Driven Private Counters. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Seungbong Park, Jaemin Han, Jongsoo Yoon |
The New Perspective on Private Cyber Coins in Electronic Commerce: A Korean Case. |
EC-Web |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Jie Fan, Guang-le Yan |
The System Dynamics Research on the Private Cars' Amount in Beijing. |
Complex (1) |
2009 |
DBLP DOI BibTeX RDF |
Private cars’ amount in Beijing, Social economic modeling, Policy simulation and control, System dynamics |
35 | Anton Joha, Marijn Janssen |
Comparing strategic intents for public-private partnerships, outsourcing and shared services. |
D.GO |
2009 |
DBLP BibTeX RDF |
decision support, outsourcing, public administration, service provisioning, sourcing, shared services, public-private partnerships |
35 | Peter Mork, Kenneth P. Smith, Barbara T. Blaustein, Chris Wolf, Keri Sarver |
Facilitating discovery on the private web using dataset digests. |
iiWAS |
2008 |
DBLP DOI BibTeX RDF |
dataset discovery, private web, search engine, structured data, disclosure |
35 | Lars Arge, Michael T. Goodrich, Michael J. Nelson 0002, Nodari Sitchinava |
Fundamental parallel algorithms for private-cache chip multiprocessors. |
SPAA |
2008 |
DBLP DOI BibTeX RDF |
parallel external memory, pem, private-cache cmp |
35 | Amos Beimel |
On private computation in incomplete networks. |
Distributed Comput. |
2007 |
DBLP DOI BibTeX RDF |
Incomplete communication networks, Connectivity, Private computation |
35 | Amos Beimel, Paz Carmi, Kobbi Nissim, Enav Weinreb |
Private approximation of search problems. |
STOC |
2006 |
DBLP DOI BibTeX RDF |
private approximation, solution-list algorithm, vertex cover, secure computation |
35 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
35 | Helger Lipmaa |
Verifiable Homomorphic Oblivious Transfer and Private Equality Test. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptographic auctions, verifiable oblivious transfer, verifiable private equality test, homomorphic encryption |
35 | T. R. N. Rao, Kil-Hyun Nam |
Private-Key Algebraic-Coded Cryptosystems. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack |
34 | Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan |
Registration and Private Key Distribution Protocol Based on IBE. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption |
34 | Markus Hinkelmann, Andreas Jakoby, Nina Moebius, Tiark Rompf, Peer Stechert |
A Cryptographically t-Private Auction System. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
multiparty private computation, garbled circuits, private auctions |
34 | Meera Balakrishnan, Andrew L. Reibman |
Reliability Models for Fault-Tolerant Private Network Applications. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
telephone networks, lumped parameter networks, fault-tolerant private network applications, corporate network, leased private lines, repair strategies, call level, approximate Markov model, lumped model, coverage parameter estimation, reliability, reliability, fault tolerant computing, parameter estimation, Markov processes, network simulation, system recovery, telecommunication network routing, reliability models, state-space model, state-space methods, time-scales, application level, dynamic rerouting |
34 | Benny Chor, Mihály Geréb-Graus, Eyal Kushilevitz |
Private Computations Over the Integers (Extended Abstract) |
FOCS |
1990 |
DBLP DOI BibTeX RDF |
countable domains, private distributed computations, t-private Boolean functions, finite domains |
34 | Liqiang Geng, Larry Korba, Xin Wang 0004, Yunli Wang, Hongyu Liu, Yonghua You |
Using Data Mining Methods to Predict Personally Identifiable Information in Emails. |
ADMA |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Martin Tomitsch, Thomas Grechenig, Pia Wascher |
Personal and private calendar interfaces support private patterns: diaries, relations, emotional expressions. |
NordiCHI |
2006 |
DBLP DOI BibTeX RDF |
personal scheduling, private calendars, emotional, diaries |
33 | Nabeel Hassan, Md. Mahfuzur Rahman, Pourang Irani, Peter Graham |
Chucking: A One-Handed Document Sharing Technique. |
INTERACT (2) |
2009 |
DBLP DOI BibTeX RDF |
Chucking, Flicking, public-to-private document sharing, multi-document environments (MDEs) |
33 | Steven Gevers, Kristof Verslype, Bart De Decker |
Enhancing privacy in identity management systems. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
microsoft cardspace, private credentials, security, privacy, identity managment systems |
33 | Da-Wei Wang 0004, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu |
Information Theoretical Analysis of Two-Party Secret Computation. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
Privacy Analysis, Scalar Product, Private Computation |
33 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Point-Based Trust: Define How Much Privacy Is Worth. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
private multi-party computation, Trust management, knapsack problem |
32 | Ruben Merz, Jean-Yves Le Boudec |
Performance Evaluation of Impulse Radio UWB Networks Using Common or Private Acquisition Preambles. |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 |
Self-enforcing Private Inference Control. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
self-enforcing, database, Inference control |
32 | Stanislaw Jarecki, Xiaomin Liu |
Private Mutual Authentication and Conditional Oblivious Transfer. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, Jaihie Kim |
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. |
IEEE Trans. Syst. Man Cybern. Part B |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Ramy Tannious, Aria Nosratinia |
Relay Channel With Private Messages. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Yuichi Nakatani, Tetsuro Tokunaga, Hitoshi Yamaguchi, Tadashi Itoh |
Proposal of a method for protecting private information in user context. |
SAINT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Taketoshi Ushiama, Toyohide Watanabe |
An Automatic Indexing Approach for Private Photo Searching Based on E-mail Archive. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Taisya Krivoruchko, James Diamond, Jeff Hooper |
Storing RSA Private Keys In Your Head. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
|
32 | YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won |
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
D-OCSP, D-OCSP-KIS, OCSP Responder, hash function |
32 | Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya |
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Michael Langberg |
Private Codes or Succinct Random Codes That Are (Almost) Perfect. |
FOCS |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang 0005 |
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Oliver Berthold, Sebastian Clauß, Stefan Köpsell, Andreas Pfitzmann |
Efficiency Improvements of the Private Message Service. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Preuß, Jens-Hagen Syrbe, Hartmut König |
Virtual Private Resources. |
EDOC |
1997 |
DBLP DOI BibTeX RDF |
|
32 | Tony Savor, Rudolph E. Seviora |
Improving the efficiency of supervision by software through state aggregation. |
IEEE Real Time Technology and Applications Symposium |
1995 |
DBLP DOI BibTeX RDF |
private telephone exchanges, supervisory software, software supervision, real time failure detection, real time system monitoring, running time complexity, specification processes, software supervisor, ITU Specification and Description Language, small private branch telephone exchange, SDL processes, telecom switching software, real-time systems, computational complexity, formal specification, fault diagnosis, telecommunication computing, state transitions, telecommunication control, computerised monitoring, inputs queues, state aggregation |
31 | Vibhor Rastogi, Suman Nath |
Differentially private aggregation of distributed time-series with transformation and encryption. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
distributed noise addition, output perturbation, participatory data mining, time-series data, private data analysis |
31 | Julien Bringer, Hervé Chabanne |
Another Look at Extended Private Information Retrieval Protocols. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Private Information Retrieval (PIR), Extended PIR (EPIR), Batching, Polynomial Evaluation |
31 | Thomas H. Morris, V. S. S. Nair |
Privacy Protected ELF for Private Computing on Public Platforms. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
distributed computing security, private computing on public platforms, grid security |
31 | Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, Cyrus Shahabi, Kian-Lee Tan |
Private queries in location based services: anonymizers are not necessary. |
SIGMOD Conference |
2008 |
DBLP DOI BibTeX RDF |
query privacy, private information retrieval, location anonymity |
31 | Ryousei Takano, Motohiko Matsuda, Tomohiro Kudoh, Yuetsu Kodama, Fumihiro Okazaki, Yutaka Ishikawa, Yasufumi Yoshizawa |
High Performance Relay Mechanism for MPI Communication Libraries Run on Multiple Private IP Address Clusters. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
IMPI, Private IP address clusters, Grid computing, MPI |
31 | Josep Domingo-Ferrer |
A Public-Key Protocol for Social Networks with Private Relationships. |
MDAI |
2007 |
DBLP DOI BibTeX RDF |
Private relationships, Privacy, Social networks, Public-key cryptography |
31 | Yitao Duan, John F. Canny |
Practical private computation of vector addition-based functions. |
PODC |
2007 |
DBLP DOI BibTeX RDF |
L2-norm, vector addition, zero-knowledge protocol, private computation |
31 | Kobbi Nissim, Sofya Raskhodnikova, Adam D. Smith |
Smooth sensitivity and sampling in private data analysis. |
STOC |
2007 |
DBLP DOI BibTeX RDF |
output perturbation, clustering, sensitivity, privacy preserving data mining, private data analysis |
31 | Michael J. Chapple, Nitesh V. Chawla, Aaron Striegel |
Authentication anomaly detection: a case study on a virtual private network. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
security, data mining, authentication, anomaly detection, virtual private network |
31 | Markus Bläser, Andreas Jakoby, Maciej Liskiewicz, Bodo Manthey |
Private Computation: k-Connected versus 1-Connected Networks. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Connectivity, Randomness, Secure multi-party computation, Secure function evaluation, Parity, Private computation |
31 | Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma |
O2O: Virtual Private Organizations to Manage Security Policy Interoperability. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Virtual Private Organization (VPO), Role Single Sign On (RSSO), Authority spheres, Access Control, Interoperability, Virtual Organization (VO), OrBAC |
31 | Cleidson R. B. de Souza, David F. Redmiles, Paul Dourish |
"Breaking the code", moving between private and public work in collaborative software development. |
GROUP |
2003 |
DBLP DOI BibTeX RDF |
private work, public work, qualitative studies, collaborative software development |
31 | Christian Cachin, Silvio Micali, Markus Stadler |
Computationally Private Information Retrieval with Polylogarithmic Communication. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Euler's function, hiding assumption, Private information retrieval, Integer factorization |
31 | Takao Kato, Kazuhiko Omachi, Shiro Tanabe |
BVPN (Broadband Virtual Private Network): a flexible, high-speed, enterprise network architecture. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
Broadband Virtual Private Network, shared buffer memory switch, Distributed processing Environment, ATM, communications networks, intelligent networks, Intelligent Network, broadband networks |
30 | Ali Khoshgozaran, Cyrus Shahabi |
Private Buddy Search: Enabling Private Spatial Queries in Social Networks. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Karol Horodecki, Michal Horodecki, Pawel Horodecki, Jonathan Oppenheim |
General Paradigm for Distilling Classical Key From Quantum States. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Brent Waters |
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Nicolas Anciaux, Mehdi Benzine, Luc Bouganim, Philippe Pucheral, Dennis E. Shasha |
GhostDB: querying visible and hidden data without leaks. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
secure device, privacy, storage model |
29 | Insoon Jo, Hyuck Han, Heon Young Yeom, Ohkyoung Kwon |
Universal Execution of Parallel Processes: Penetrating NATs over the Grid. |
International Conference on Computational Science (2) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sabah S. Al-Fedaghi |
Security Model for Informational Privacy. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Jichuan Chang, Gurindar S. Sohi |
Cooperative Caching for Chip Multiprocessors. |
ISCA |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Keith B. Frikken, Mikhail J. Atallah, Chen Zhang |
Privacy-preserving credit checking. |
EC |
2005 |
DBLP DOI BibTeX RDF |
privacy, e-commerce, secure protocol, secure multi-party computation |
29 | Philip D. MacKenzie, Michael K. Reiter |
Delegation of cryptographic servers for capture-resilient devices. |
Distributed Comput. |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Frans A. Lategan, Martin S. Olivier |
A Chinese Wall Approach to Privacy Policies for the Web. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
Chinese Wall, Privacy, Access Control, P3P |
29 | Philip D. MacKenzie, Michael K. Reiter |
Delegation of cryptographic servers for capture-resilient devices. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Zhihui Wang 0009, Wei Wang 0009, Baile Shi, S. H. Boey |
Privacy-Preserving Frequent Pattern Sharing. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
private pattern, privacy preservation, Frequent pattern |
28 | Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations |
28 | Erica Robles, Abhay Sukumaran, Kathryn Rickertsen, Clifford Nass |
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
evaluation, ubiquitous computing, computer-mediated communication, feedback, public, private, shared experience |
28 | Ping Lin, K. Selçuk Candan |
Secure and Privacy Preserving Outsourcing of Tree Structured Data. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
Tree structured data (XML) Security, Private Information Retrieval, Search on Encrypted Data |
28 | Steven R. Johnston |
Development of a Legal Framework for Intrusion Detection. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Anti-terrorism law, criminal law, private communications, privacy, intrusion detection, wiretap, interception |
28 | Alex Galis, Stefan Covaci |
Active Virtual Provate Network Services on Demand. |
INTERWORKING |
2000 |
DBLP DOI BibTeX RDF |
Miami Project, Mobile Agents, Virtual Enterprise, Virtual Private Networks, Active Services |
27 | Todd A. Anderson 0001 |
Optimizations in a private nursery-based garbage collector. |
ISMM |
2010 |
DBLP DOI BibTeX RDF |
garbage collection, functional languages |
27 | Elena Zheleva, Lise Getoor |
To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
attribute inference, privacy, social networks, groups |
27 | Alaa Aref El Masri, João Pedro Sousa |
Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance Model. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jun Sakuma, Shigenobu Kobayashi |
Link analysis for private weighted graphs. |
SIGIR |
2009 |
DBLP DOI BibTeX RDF |
privacy, ranking, link analysis, pagerank, hits |
27 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
Displaying result #1 - #100 of 14779 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|