Zero-knowledge proofs of identity
Journal of Cryptology
CRYPTO '88 Proceedings on Advances in cryptology
Non-interactive oblivious transfer and applications
CRYPTO '89 Proceedings on Advances in cryptology
Liability for defective electronic information
Communications of the ACM
Recommending and evaluating choices in a virtual community of use
CHI '95 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Comparing information without leaking it
Communications of the ACM
Communities of practice: performance and evolution
Computational & Mathematical Organization Theory
Recommender systems for evaluating computer messages
Communications of the ACM
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Designated verifier proofs and their applications
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Protecting privacy while sharing information in electronic communities
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Disclosing users' data in an environment that preserves privacy
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Communications of the ACM - Information cities
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
IEEE Transactions on Knowledge and Data Engineering
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
International Journal of Electronic Commerce
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Security challenges for reputation mechanisms using online social networks
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Private record matching using differential privacy
Proceedings of the 13th International Conference on Extending Database Technology
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Reputation mechanisms in an exchange economy
Electronic Commerce Research and Applications
Private discovery of common social contacts
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Short paper: can your phone trust your friend selection?
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Finding pareto-optimal set of distributed vectors with minimum disclosure
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
Experimental evaluation of an ebay-style self-reporting reputation mechanism
WINE'05 Proceedings of the First international conference on Internet and Network Economics
On honesty in sovereign information sharing
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Sovereign information sharing among malicious partners
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Practical private set intersection protocols with linear complexity
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
International Journal of Applied Cryptography
Hi-index | 0.00 |