Information-Theoretic Private Information Retrieval: A Unified Construction
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Secure Multiparty Computation of Approximations
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Priced Oblivious Transfer: How to Sell Digital Goods
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Quantum symmetrically-private information retrieval
Information Processing Letters
Privacy preserving database application testing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Oblivious signature-based envelope
Distributed Computing
Secure multiparty computation of approximations
ACM Transactions on Algorithms (TALG)
A New Protocol for Conditional Disclosure of Secrets and Its Applications
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
ISC '08 Proceedings of the 11th international conference on Information Security
Selling multiple secrets to a single buyer
Information Sciences: an International Journal
Private multiparty sampling and approximation of vector combinations
Theoretical Computer Science
On indexing and information disclosure measure for efficient cryptograph query
ICCOMP'09 Proceedings of the WSEAES 13th international conference on Computers
Secure anonymous database search
Proceedings of the 2009 ACM workshop on Cloud computing security
A cryptography index technology and method to measure information disclosure in the DAS model
WSEAS Transactions on Information Science and Applications
Distributed certified information access for mobile devices
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Some applications of polynomials for the design of cryptographic protocols
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Quantum private queries: security analysis
IEEE Transactions on Information Theory
Worry-free encryption: functional encryption with public keys
Proceedings of the 17th ACM conference on Computer and communications security
Restricted adaptive oblivious transfer
Theoretical Computer Science
Private search in the real world
Proceedings of the 27th Annual Computer Security Applications Conference
Privacy-Preserving graph algorithms in the semi-honest model
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Evaluating 2-DNF formulas on ciphertexts
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Secure computation of constant-depth circuits with applications to database search problems
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Private multiparty sampling and approximation of vector combinations
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
Journal of Systems and Software
Flexible protocol for quantum private query based on B92 protocol
Quantum Information Processing
Coding-based quantum private database query using entanglement
Quantum Information & Computation
Hi-index | 0.06 |