Authentication using minimally trusted servers
ACM SIGOPS Operating Systems Review
A new public key cryptosystem based on higher residues
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Practical Solutions to Key Recovery Based on PKI in IP Security
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
On Solutions to the Key Escrow Problem
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Distributed privacy preserving information sharing
VLDB '05 Proceedings of the 31st international conference on Very large data bases
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
The eternal resource locator: an alternative means of establishing trust on the world wide web
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
ABACUS: a distributed middleware for privacy preserving data sharing across private data warehouses
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
Casper*: Query processing for location services without compromising privacy
ACM Transactions on Database Systems (TODS)
A secure multiple-agent cryptographic key recovery system
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Binding ElGamal: a fraud-detectable alternative to key-escrow proposals
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Sovereign information sharing among malicious partners
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
ABACUS: a distributed middleware for privacy preserving data sharing across private data warehouses
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Computing join aggregates over private tables
DaWaK'07 Proceedings of the 9th international conference on Data Warehousing and Knowledge Discovery
Hi-index | 0.01 |