FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Association rules mining in vertically partitioned databases
Data & Knowledge Engineering - Special issue: WIDM 2004
Composition attacks and auxiliary information in data privacy
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
Information Security and Cryptology
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Preliminary Result on Secure Protocols for Multiple Issue Negotiation Problems
PRIMA '08 Proceedings of the 11th Pacific Rim International Conference on Multi-Agents: Intelligent Agents and Multi-Agent Systems
Finding Nash bargaining solutions for multi-issue negotiations: a preliminary result
HuCom '08 Proceedings of the 1st International Working Conference on Human Factors and Computational Models in Negotiation
Secure and efficient protocols for multiple interdependent issues negotiation
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology - Knowledge integration and management in autonomous systems
The security proof of a 4-way handshake protocol in IEEE 802.11i
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Universally composable time-stamping schemes with audit
ISC'05 Proceedings of the 8th international conference on Information Security
Towards privacy-preserving computing on distributed electronic health record data
Proceedings of the 2013 Middleware Doctoral Symposium
Hi-index | 0.00 |