Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A new model of security for metasystems
Future Generation Computer Systems - Special issue on metacomputing
A guided tour to approximate string matching
ACM Computing Surveys (CSUR)
Speeding Up Secret Computations with Insecure Auxiliary Devices
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Efficient approximate and dynamic matching of patterns using a labeling paradigm
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
Secure outsourcing of sequence comparisons
International Journal of Information Security - Special issue on SC 2003
Speeding up Exponentiation using an Untrusted Computational Resource
Designs, Codes and Cryptography
How to securely outsource cryptographic computations
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Threat model for grid security services
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Mining sequential patterns by PrefixSpan algorithm with approximation
ACS'08 Proceedings of the 8th conference on Applied computer scince
New methods of secure outsourcing of scientific computations
The Journal of Supercomputing
Hi-index | 0.00 |
This paper investigates the role of multi-modal metaphors for e-commerce applications. More specifically, the use of textual representations (including tabular representations and tables), graphical representations (including dynamically formed graphs) ...