Li, Nan; Kolmanovsky, Ilya; Girard, Anouck Detection-averse optimal and receding-horizon control for Markov decision processes. (English) Zbl 1453.93243 Automatica 122, Article ID 109278, 8 p. (2020). MSC: 93E20 90C40 PDF BibTeX XML Cite \textit{N. Li} et al., Automatica 122, Article ID 109278, 8 p. (2020; Zbl 1453.93243) Full Text: DOI
Liu, Joseph K. (ed.); Cui, Hui (ed.) Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30–December 2, 2020. Proceedings. (English) Zbl 07268294 Lecture Notes in Computer Science 12248. Cham: Springer (ISBN 978-3-030-55303-6/pbk; 978-3-030-55304-3/ebook). xvi, 676 p. (2020). MSC: 68-06 68M25 68P27 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{J. K. Liu} (ed.) and \textit{H. Cui} (ed.), Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30--December 2, 2020. Proceedings. Cham: Springer (2020; Zbl 07268294) Full Text: DOI
Bultel, Xavier; Dreier, Jannik; Dumas, Jean-Guillaume; Lafourcade, Pascal A faster cryptographer’s Conspiracy Santa. (English) Zbl 1453.68081 Theor. Comput. Sci. 839, 122-134 (2020). MSC: 68Q10 68P27 68Q17 68Q25 91A12 91A68 94A60 PDF BibTeX XML Cite \textit{X. Bultel} et al., Theor. Comput. Sci. 839, 122--134 (2020; Zbl 1453.68081) Full Text: DOI
Liu, Wen; Li, Yu-Gang; Wang, Yong-Bin A novel quantum solution to privacy-preserving lexicographical string sorting problem. (English) Zbl 1435.68103 Int. J. Theor. Phys. 59, No. 3, 754-762 (2020). MSC: 68Q12 68P10 68P27 81P68 81P94 PDF BibTeX XML Cite \textit{W. Liu} et al., Int. J. Theor. Phys. 59, No. 3, 754--762 (2020; Zbl 1435.68103) Full Text: DOI
Naito, Yusuke A highly secure MAC from tweakable blockciphers with support for short tweaks. (English) Zbl 1439.94052 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 588-606 (2019). MSC: 94A60 94A62 68M25 68P27 PDF BibTeX XML Cite \textit{Y. Naito}, Lect. Notes Comput. Sci. 11547, 588--606 (2019; Zbl 1439.94052) Full Text: DOI
Ichikawa, Atsunori; Ogata, Wakaha; Hamada, Koki; Kikuchi, Ryo Efficient secure multi-party protocols for decision tree classification. (English) Zbl 1443.68039 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 362-380 (2019). MSC: 68M25 68P27 68Q11 68T05 94A60 PDF BibTeX XML Cite \textit{A. Ichikawa} et al., Lect. Notes Comput. Sci. 11547, 362--380 (2019; Zbl 1443.68039) Full Text: DOI
Bhasin, Shivam (ed.); Mendelson, Avi (ed.); Nandi, Mridul (ed.) Security, privacy, and applied cryptography engineering. 9th international conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019. Proceedings. (English) Zbl 1428.68008 Lecture Notes in Computer Science 11947. Cham: Springer (ISBN 978-3-030-35868-6/pbk; 978-3-030-35869-3/ebook). x, 237 p. (2019). MSC: 68-06 68M25 68P27 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{S. Bhasin} (ed.) et al., Security, privacy, and applied cryptography engineering. 9th international conference, SPACE 2019, Gandhinagar, India, December 3--7, 2019. Proceedings. Cham: Springer (2019; Zbl 1428.68008) Full Text: DOI
Jang-Jaccard, Julian (ed.); Guo, Fuchun (ed.) Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. (English) Zbl 1428.68026 Lecture Notes in Computer Science 11547. Cham: Springer (ISBN 978-3-030-21547-7/pbk; 978-3-030-21548-4/ebook). xiv, 688 p. (2019). MSC: 68-06 68M25 68P27 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{J. Jang-Jaccard} (ed.) and \textit{F. Guo} (ed.), Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3--5, 2019. Proceedings. Cham: Springer (2019; Zbl 1428.68026) Full Text: DOI
Liu, Yi; Luo, Yu; Zhu, Youwen; Liu, Yang; Li, Xingxin Secure multi-label data classification in cloud by additionally homomorphic encryption. (English) Zbl 1441.68209 Inf. Sci. 468, 89-102 (2018). MSC: 68T05 62H30 68P25 PDF BibTeX XML Cite \textit{Y. Liu} et al., Inf. Sci. 468, 89--102 (2018; Zbl 1441.68209) Full Text: DOI
Yan, Zheng; Wang, Pu; Feng, Wei A novel scheme of anonymous authentication on trust in pervasive social networking. (English) Zbl 1440.94103 Inf. Sci. 445-446, 79-96 (2018). MSC: 94A62 68P27 91D30 PDF BibTeX XML Cite \textit{Z. Yan} et al., Inf. Sci. 445--446, 79--96 (2018; Zbl 1440.94103) Full Text: DOI
Kelarev, Andrei; Ryan, Joe; Rylands, Leanne; Seberry, Jennifer; Yi, Xun Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller. (English) Zbl 1410.68110 J. Discrete Algorithms 52-53, 112-121 (2018). MSC: 68P15 68Q17 68Q25 68W05 PDF BibTeX XML Cite \textit{A. Kelarev} et al., J. Discrete Algorithms 52--53, 112--121 (2018; Zbl 1410.68110) Full Text: DOI
Xiang, Shijun; Yang, Le Robust and reversible image watermarking algorithm in homomorphic encrypted domain. (Chinese. English summary) Zbl 1413.68050 J. Softw. 29, No. 4, 957-972 (2018). MSC: 68P25 68P30 68U10 PDF BibTeX XML Cite \textit{S. Xiang} and \textit{L. Yang}, J. Softw. 29, No. 4, 957--972 (2018; Zbl 1413.68050) Full Text: DOI
Hu, Guiqiang; Xiao, Di; Xiang, Tao; Bai, Sen; Zhang, Yushu A compressive sensing based privacy preserving outsourcing of image storage and identity authentication service in cloud. (English) Zbl 1429.68015 Inf. Sci. 387, 132-145 (2017). MSC: 68M11 68P20 68P25 68P27 68U10 94A62 PDF BibTeX XML Cite \textit{G. Hu} et al., Inf. Sci. 387, 132--145 (2017; Zbl 1429.68015) Full Text: DOI
D’Orazio, Christian J.; Lu, Rongxing; Choo, Kim-Kwang Raymond; Vasilakos, Athanasios V. A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps. (English) Zbl 1411.94058 Appl. Math. Comput. 293, 523-544 (2017). MSC: 94A60 94A12 68P25 PDF BibTeX XML Cite \textit{C. J. D'Orazio} et al., Appl. Math. Comput. 293, 523--544 (2017; Zbl 1411.94058) Full Text: DOI
Cui, Hui; Deng, Robert H.; Liu, Joseph K.; Li, Yingjiu Attribute-based encryption with expressive and authorized keyword search. (English) Zbl 1386.94068 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 106-126 (2017). MSC: 94A60 PDF BibTeX XML Cite \textit{H. Cui} et al., Lect. Notes Comput. Sci. 10342, 106--126 (2017; Zbl 1386.94068) Full Text: DOI
Ford, Vitaly; Siraj, Ambareen; Ashiqur Rahman, Mohammad Secure and efficient protection of consumer privacy in advanced metering infrastructure supporting fine-grained data analysis. (English) Zbl 1350.68034 J. Comput. Syst. Sci. 83, 84-100 (2017). MSC: 68M12 68M10 94A60 PDF BibTeX XML Cite \textit{V. Ford} et al., J. Comput. Syst. Sci. 83, 84--100 (2017; Zbl 1350.68034) Full Text: DOI
Li, Xingxin; Zhu, Youwen; Wang, Jian Secure naïve Bayesian classification over encrypted data in cloud. (English) Zbl 1381.94102 Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 130-150 (2016). MSC: 94A62 68P25 PDF BibTeX XML Cite \textit{X. Li} et al., Lect. Notes Comput. Sci. 10005, 130--150 (2016; Zbl 1381.94102) Full Text: DOI
Jerath, Kinshuk; Fader, Peter S.; Hardie, Bruce G. S. Customer-base analysis using repeated cross-sectional summary (RCSS) data. (English) Zbl 1346.62161 Eur. J. Oper. Res. 249, No. 1, 340-350 (2016). MSC: 62P20 91B42 PDF BibTeX XML Cite \textit{K. Jerath} et al., Eur. J. Oper. Res. 249, No. 1, 340--350 (2016; Zbl 1346.62161) Full Text: DOI
Hwang, Ren-Junn; Lai, Chih-Hua Provable fair document exchange protocol with transaction privacy for e-commerce. (English) Zbl 1420.68084 Symmetry 7, No. 2, 464-487 (2015). MSC: 68P25 68M12 91B26 PDF BibTeX XML Cite \textit{R.-J. Hwang} and \textit{C.-H. Lai}, Symmetry 7, No. 2, 464--487 (2015; Zbl 1420.68084) Full Text: DOI
Guo, Wenjie; Zhang, Yinghui; Zheng, Dong Fuzzy search over encrypted data supporting word frequencies and user preferences in cloud storage. (Chinese. English summary) Zbl 1349.68072 J. Shenzhen Univ., Sci. Eng. 32, No. 5, 532-537 (2015). MSC: 68P20 68M11 68P25 PDF BibTeX XML Cite \textit{W. Guo} et al., J. Shenzhen Univ., Sci. Eng. 32, No. 5, 532--537 (2015; Zbl 1349.68072) Full Text: DOI
Kawamoto, Junpei A locality sensitive hashing filter for encrypted vector databases. (English) Zbl 1335.68080 Fundam. Inform. 137, No. 2, 291-304 (2015). MSC: 68P15 68P25 PDF BibTeX XML Cite \textit{J. Kawamoto}, Fundam. Inform. 137, No. 2, 291--304 (2015; Zbl 1335.68080) Full Text: DOI
Emekci, Fatih; Methwally, Ahmed; Agrawal, Divyakant; El Abbadi, Amr Dividing secrets to secure data outsourcing. (English) Zbl 1328.68050 Inf. Sci. 263, 198-210 (2014). MSC: 68P15 68P25 PDF BibTeX XML Cite \textit{F. Emekci} et al., Inf. Sci. 263, 198--210 (2014; Zbl 1328.68050) Full Text: DOI
Hakuta, Keisuke; Sato, Hisayoshi Cryptographic technology for benefiting from Big Data. (English) Zbl 1326.94096 Wakayama, Masato (ed.) et al., The impact of applications on mathematics. Proceedings of the Forum of Mathematics for Industry, “Math-for-Industry 2013”, Fukuoka, Japan, November 4–8, 2013. Tokyo: Springer (ISBN 978-4-431-54906-2/hbk; 978-4-431-54907-9/ebook). Mathematics for Industry 1, 85-95 (2014). MSC: 94A60 94-03 01A61 62H30 68P25 PDF BibTeX XML Cite \textit{K. Hakuta} and \textit{H. Sato}, Math. Ind. (Tokyo) 1, 85--95 (2014; Zbl 1326.94096) Full Text: DOI
Pape, Sebastian Authentication in insecure environments. Using visual cryptography and non-transferable credentials in practise. (English) Zbl 1321.94112 Wiesbaden: Springer Vieweg; Kassel: Univ. Kassel (Diss. 2013) (ISBN 978-3-658-07115-8/pbk; 978-3-658-07116-5/ebook). xvi, 362 p. (2014). Reviewer: Rainer Horsch (Oberteuringen) MSC: 94A62 94-02 94A60 68P25 PDF BibTeX XML Cite \textit{S. Pape}, Authentication in insecure environments. Using visual cryptography and non-transferable credentials in practise. Wiesbaden: Springer Vieweg; Kassel: Univ. Kassel (Diss. 2013) (2014; Zbl 1321.94112) Full Text: DOI
Zhang, Zhijiao; Zhang, Lei; Chen, Yu; Shi, Yuanchun Running multiple Androids on one ARM platform. (English) Zbl 1337.94089 Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 438-445 (2014). MSC: 94A60 68P25 68M12 PDF BibTeX XML Cite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 8544, 438--445 (2014; Zbl 1337.94089) Full Text: DOI
Koot, Matthijs; Mandjes, Michel; van’t Noordende, Guidot; de Laat, Cees A probabilistic perspective on re-identifiability. (English) Zbl 1409.91199 Math. Popul. Stud. 20, No. 3, 155-171 (2013). MSC: 91D20 62P25 PDF BibTeX XML Cite \textit{M. Koot} et al., Math. Popul. Stud. 20, No. 3, 155--171 (2013; Zbl 1409.91199) Full Text: DOI
Wei, Zhanzhen; Yang, Yatao; Chen, Zhiwei Ciphertext retrieval in database based on RSA’s multiplicative homomorphism. (Chinese. English summary) Zbl 1289.68032 J. Harbin Eng. Univ. 34, No. 5, 641-645 (2013). MSC: 68P15 68M12 68P20 68P25 PDF BibTeX XML Cite \textit{Z. Wei} et al., J. Harbin Eng. Univ. 34, No. 5, 641--645 (2013; Zbl 1289.68032) Full Text: DOI
Mjølsnes, Stig F. A multidisciplinary introduction to information security. (English) Zbl 1236.94006 Discrete Mathematics and its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4200-8590-7/hbk). xxv, 322 p. (2012). MSC: 94-01 68M10 68M12 68P25 81P94 94A05 94A60 94A62 PDF BibTeX XML Cite \textit{S. F. Mjølsnes}, A multidisciplinary introduction to information security. Boca Raton, FL: CRC Press (2012; Zbl 1236.94006)
Burkhart, Martin Enabling collaborative network security with privacy-preserving data aggregation. (English) Zbl 1230.68039 Berichte aus der Kommunikationstechnik; TIK-Schriftenreihe 125. Aachen: Shaker Verlag; Zürich: ETH Eidgenössische Technische Hochschule Zürich (Diss. ETH No. 19683) (ISBN 978-3-8440-0245-4/pbk). xvii, 186 p. (2011). Reviewer: Telman Aliev (Baku) MSC: 68M10 68M12 94A12 94A62 68-02 PDF BibTeX XML Cite \textit{M. Burkhart}, Enabling collaborative network security with privacy-preserving data aggregation. Aachen: Shaker Verlag; Zürich: ETH Eidgenössische Technische Hochschule Zürich (Diss. ETH No. 19683) (2011; Zbl 1230.68039) Full Text: Link
Foresti, Sara Preserving privacy in data outsourcing. Foreword by Pierangela Samarati. (English) Zbl 1213.68248 Advances in Information Security 51. New York, NY: Springer (ISBN 978-1-4419-7658-1/hbk; 978-1-4419-7659-8/ebook). xv, 180 p. (2011). Reviewer: Telman Aliev (Baku) MSC: 68P25 68P05 68P15 68P20 68-02 PDF BibTeX XML Cite \textit{S. Foresti}, Preserving privacy in data outsourcing. Foreword by Pierangela Samarati. New York, NY: Springer (2011; Zbl 1213.68248) Full Text: DOI
Rosenberg, Burton (ed.) Handbook of financial cryptography and security. (English) Zbl 1232.94001 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-4200-5981-6/hbk; 978-1-4200-5982-3/ebook). xxvi, 605 p. (2011). MSC: 94-00 68-00 68P25 91G99 94A60 94A62 PDF BibTeX XML Cite \textit{B. Rosenberg} (ed.), Handbook of financial cryptography and security. Boca Raton, FL: CRC Press (2011; Zbl 1232.94001) Full Text: DOI
Li, Zi-chen; Yang, Ya-tao; Cao, Lu-lin; Guo, Bao-an; Xu, Shu-min Improved direct anonymous cross-domain authentication scheme. (Chinese. English summary) Zbl 1247.68078 J. Comput. Appl. 30, No. 12, 3331-3333 (2010). MSC: 68P25 94A62 68M10 PDF BibTeX XML Cite \textit{Z.-c. Li} et al., J. Comput. Appl. 30, No. 12, 3331--3333 (2010; Zbl 1247.68078) Full Text: DOI
Novotný, Marián A privacy-aware protocol for sociometric questionnaires. (English) Zbl 1247.91167 Hlinený, Petr (ed.) et al., Annual doctoral workshop on mathematical and engineering methods in computer science (MEMICS’09). Selected papers based on the presentations at the workshop, November 13-15, 2009, Znojmo, Czech Republic. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-15-6). OASIcs – OpenAccess Series in Informatics 13, 1-9, electronic only (2009). MSC: 91E45 05C90 68P25 PDF BibTeX XML Cite \textit{M. Novotný}, OASIcs -- OpenAccess Ser. Inform. 13, 1--9 (2009; Zbl 1247.91167) Full Text: DOI
Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. Multiuser private queries over encrypted databases. (English) Zbl 1171.68460 Int. J. Appl. Cryptogr. 1, No. 4, 309-319 (2009). MSC: 68P20 94A60 PDF BibTeX XML Cite \textit{Y. Yang} et al., Int. J. Appl. Cryptogr. 1, No. 4, 309--319 (2009; Zbl 1171.68460) Full Text: DOI
Jonker, Hugo; Mauw, Sjouke; Pang, Jun A formal framework for quantifying voter-controlled privacy. (English) Zbl 1192.68240 J. Algorithms 64, No. 2-3, 89-105 (2009). MSC: 68P25 68M10 PDF BibTeX XML Cite \textit{H. Jonker} et al., J. Algorithms 64, No. 2--3, 89--105 (2009; Zbl 1192.68240) Full Text: DOI
Domingo-Ferrer, Josep; Bras-Amorós, Maria A shared steganographic file system with error correction. (English) Zbl 1178.68223 Torra, Vicenç (ed.) et al., Modeling decisions for artificial intelligence. 5th international conference, MDAI 2008, Sabadell, Spain, October 30–31, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-88268-8/pbk). Lecture Notes in Computer Science 5285. Lecture Notes in Artificial Intelligence, 227-238 (2008). MSC: 68P25 PDF BibTeX XML Cite \textit{J. Domingo-Ferrer} and \textit{M. Bras-Amorós}, Lect. Notes Comput. Sci. 5285, 227--238 (2008; Zbl 1178.68223) Full Text: DOI
Dimitriou, Tassos; Karame, Ghassan; Christou, Ioannis Supertrust, a secure and efficient framework for handling trust in super-peer networks. (English) Zbl 1283.68090 Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 374-375 (2007). MSC: 68M14 94A60 68P20 PDF BibTeX XML Cite \textit{T. Dimitriou} et al., in: Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC '07, Portland, OR, USA, August 12--15, 2007. New York, NY: Association for Computing Machinery (ACM). 374--375 (2007; Zbl 1283.68090) Full Text: DOI
De Loera, Jesús A.; Onn, Shmuel All linear and integer programs are slim 3-way transportation programs. (English) Zbl 1128.90041 SIAM J. Optim. 17, No. 3, 806-821 (2006). MSC: 90C11 52B55 90B06 68R05 15A39 62H17 PDF BibTeX XML Cite \textit{J. A. De Loera} and \textit{S. Onn}, SIAM J. Optim. 17, No. 3, 806--821 (2006; Zbl 1128.90041) Full Text: DOI
Lu, Chenghuai; Zhang, Tao; Shi, Weidong; Lee, Hsien-Hsin S. M-TREE: a high efficiency security architecture for protecting integrity and privacy of software. (English) Zbl 1102.68447 J. Parallel Distrib. Comput. 66, No. 9, 1116-1128 (2006). MSC: 68N99 PDF BibTeX XML Cite \textit{C. Lu} et al., J. Parallel Distrib. Comput. 66, No. 9, 1116--1128 (2006; Zbl 1102.68447) Full Text: DOI
Liao, Jian; Qi, Yinghao; Huang, Peiwei; Rong, Mengtian; Li, Shenghong Protection of mobile location privacy by using blind signature. (English) Zbl 1103.68527 J. Zhejiang Univ., Sci. A 7, No. 6, 984-989 (2006). MSC: 68P25 94A62 PDF BibTeX XML Cite \textit{J. Liao} et al., J. Zhejiang Univ., Sci. A 7, No. 6, 984--989 (2006; Zbl 1103.68527) Full Text: DOI
Ostrovsky, Rafail; Skeith, William E. III Private searching on streaming data. (English) Zbl 1145.94472 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 223-240 (2005). MSC: 94A62 68P10 68P15 68P20 PDF BibTeX XML Cite \textit{R. Ostrovsky} and \textit{W. E. Skeith III}, Lect. Notes Comput. Sci. 3621, 223--240 (2005; Zbl 1145.94472) Full Text: DOI
Zhan, Justin; Matwin, Stan; Chang, LiWu Privacy-preserving collaborative association rule mining. (English) Zbl 1158.68385 Jajodia, Sushil (ed.) et al., Data and applications security XIX. 19th annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, USA, August 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28138-X/pbk). Lecture Notes in Computer Science 3654, 153-165 (2005). MSC: 68P25 68T05 PDF BibTeX XML Cite \textit{J. Zhan} et al., Lect. Notes Comput. Sci. 3654, 153--165 (2005; Zbl 1158.68385) Full Text: DOI
Lee, Narn-Yih; Lee, Ming-Feng The security of a strong proxy signature scheme with proxy signer privacy protection. (English) Zbl 1060.94036 Appl. Math. Comput. 161, No. 3, 807-812 (2005). MSC: 94A62 94A60 68P25 PDF BibTeX XML Cite \textit{N.-Y. Lee} and \textit{M.-F. Lee}, Appl. Math. Comput. 161, No. 3, 807--812 (2005; Zbl 1060.94036) Full Text: DOI
Laguillaumie, Fabien; Vergnaud, Damien Multi-designated verifiers signatures. (English) Zbl 1109.68469 Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 495-507 (2004). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{F. Laguillaumie} and \textit{D. Vergnaud}, Lect. Notes Comput. Sci. 3269, 495--507 (2004; Zbl 1109.68469) Full Text: DOI
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. (English) Zbl 1103.68533 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{L. Nguyen} et al., Lect. Notes Comput. Sci. 3089, 61--75 (2004; Zbl 1103.68533) Full Text: DOI
Farkas, Csilla (ed.); Samarati, Pierangela (ed.) Research directions in data and applications security XVIII. IFIP TC11/WG11.3 eighteenth annual conference on data and applications security, Sitges, Catalonia, Spain, July 25–28, 2004. (English) Zbl 1060.68007 IFIP, International Federation for Information Processing 144. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-8127-8/hbk). xii, 384 p. (2004). MSC: 68M10 68M14 68P15 68-01 68P25 PDF BibTeX XML Cite \textit{C. Farkas} (ed.) and \textit{P. Samarati} (ed.), Research directions in data and applications security XVIII. IFIP TC11/WG11.3 eighteenth annual conference on data and applications security, Sitges, Catalonia, Spain, July 25--28, 2004. Boston, MA: Kluwer Academic Publishers (2004; Zbl 1060.68007)
Fan, Jinliang; Xu, Jun; Ammar, Mostafa H.; Moon, Sue B. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme. (English) Zbl 1071.68527 Comput. Netw. 46, No. 2, 253-272 (2004). MSC: 68P25 68M10 PDF BibTeX XML Cite \textit{J. Fan} et al., Comput. Netw. 46, No. 2, 253--272 (2004; Zbl 1071.68527) Full Text: DOI
Safavi-Naini, Rei (ed.); Seberry, Jennifer (ed.) Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. (English) Zbl 1027.00042 Lecture Notes in Computer Science. 2727. Berlin: Springer. xii, 534 p. (2003). MSC: 00B25 94-06 68-06 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{R. Safavi-Naini} (ed.) and \textit{J. Seberry} (ed.), Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9--11, 2003. Proceedings. Berlin: Springer (2003; Zbl 1027.00042) Full Text: Link
Gritzalis, Dimitris (ed.); De Capitani di Vimercati, Sabrina (ed.); Samarati, Pierangela (ed.); Katsikas, Sokratis (ed.) Security and privacy in the age of uncertainty. IFIP TC11 18th international conference on information security (SEC2003), May 26–28, 2003, Athens, Greece. (English) Zbl 1022.68006 IFIP, International Federation for Information Processing. 122. Boston, MA: Kluwer Academic Publishers. xviii, 494 p. (2003). MSC: 68M10 68-06 94-06 00B25 68P25 PDF BibTeX XML Cite \textit{D. Gritzalis} (ed.) et al., Security and privacy in the age of uncertainty. IFIP TC11 18th international conference on information security (SEC2003), May 26--28, 2003, Athens, Greece. Boston, MA: Kluwer Academic Publishers (2003; Zbl 1022.68006)
Schreck, Jörg Security and privacy in user modeling. (English) Zbl 1034.68033 Human-Computer Interaction Series 2. Dordrecht: Kluwer Academic Publishers (ISBN 1-4020-1130-X/hbk). xxi, 210 p. (2003). Reviewer: Jozef Vyskoč (Bratislava) MSC: 68P25 68U35 68T05 PDF BibTeX XML Cite \textit{J. Schreck}, Security and privacy in user modeling. Dordrecht: Kluwer Academic Publishers (2003; Zbl 1034.68033)
Domingo-Ferrer, Josep Advances in inference control in statistical databases: An overview. (English) Zbl 1051.68637 Domingo-Ferrer, Josep (ed.), Inference control in statistical databases. From theory to practice. Berlin: Springer (ISBN 3-540-43614-6). Lect. Notes Comput. Sci. 2316, 1-7 (2002). MSC: 68U99 68P15 PDF BibTeX XML Cite \textit{J. Domingo-Ferrer}, Lect. Notes Comput. Sci. 2316, 1--7 (2002; Zbl 1051.68637) Full Text: Link
Domingo-Ferrer, Josep A provably secure additive and multiplicative privacy homomorphism. (English) Zbl 1019.68546 Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 471-483 (2002). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{J. Domingo-Ferrer}, Lect. Notes Comput. Sci. 2433, 471--483 (2002; Zbl 1019.68546) Full Text: Link
Naor, Moni; Teague, Vanessa Anti-presistence, history independent data structures. (English) Zbl 1323.68244 Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 492-501 (2001). MSC: 68P05 68P10 68Q17 68Q25 68W05 PDF BibTeX XML Cite \textit{M. Naor} and \textit{V. Teague}, in: Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6--8, 2001. New York, NY: ACM Press. 492--501 (2001; Zbl 1323.68244) Full Text: DOI
Blundo, Carlo; D’Arco, Paolo; De Santis, Alfredo A \(t\)-private \(k\)-database information retrieval scheme. (English) Zbl 1053.68041 Int. J. Inf. Secur. 1, No. 1, 64-68 (2001). MSC: 68P20 68P15 68P25 PDF BibTeX XML Cite \textit{C. Blundo} et al., Int. J. Inf. Secur. 1, No. 1, 64--68 (2001; Zbl 1053.68041) Full Text: DOI
Syverson, Paul; Tsudik, Gene; Reed, Michael; Landwehr, Carl Towards an analysis of onion routing security. (English) Zbl 0977.68772 Federrath, Hannes (ed.), Designing privacy enhancing technologies. International workshop on design issues in anonymity and unobservability. Berkeley, CA, USA, July 25-26, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2009, 96-140 (2001). MSC: 68U99 68P25 68M10 PDF BibTeX XML Cite \textit{P. Syverson} et al., Lect. Notes Comput. Sci. 2009, 96--140 (2001; Zbl 0977.68772) Full Text: Link
Pieprzyk, Josef (ed.); Safavi-Naini, Rei (ed.) ACISP ’99, the 4th Australasian information security and privacy conference, Univ. of Wollongong, Australia, April 7–9, 1999. (English) Zbl 0940.00054 Aust. Comput. J. 31, No. 2, 34-64 (1999). MSC: 00B25 68-06 94-06 94A60 68P25 PDF BibTeX XML Cite \textit{J. Pieprzyk} (ed.) and \textit{R. Safavi-Naini} (ed.), Aust. Comput. J. 31, No. 2, 34--64 (1999; Zbl 0940.00054)
Boyd, Colin (ed.); Dawson, Ed (ed.) Information security and privacy. 3rd Australasian conference, ACISP ’98, Brisbane, Australia, July 13–15, 1998. Proceedings. (English) Zbl 0892.00054 Lecture Notes in Computer Science. 1438. Berlin: Springer. xi, 423 p. (1998). MSC: 00B25 94-06 68-06 94A60 68P25 PDF BibTeX XML Cite \textit{C. Boyd} (ed.) and \textit{E. Dawson} (ed.), Information security and privacy. 3rd Australasian conference, ACISP '98, Brisbane, Australia, July 13--15, 1998. Proceedings. Berlin: Springer (1998; Zbl 0892.00054) Full Text: DOI
Zhou, Dan; Chin, Shiu-Kai Verifying privacy enhanced mail functions with higher order logic. (English) Zbl 0889.68054 Wright, Rebecca N. (ed.) et al., Network threats. DIMACS workshop, New Brunswick, NJ, USA, December 2–4, 1996. Providence, RI: AMS, American Mathematical Society. DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 11-20 (1998). MSC: 68P25 68M99 68M10 PDF BibTeX XML Cite \textit{D. Zhou} and \textit{S.-K. Chin}, DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 11--20 (1998; Zbl 0889.68054)
Varadharajan, Vijay (ed.); Pieprzyk, Josef (ed.); Mu, Yi (ed.) Information security and privacy. 2nd Australasian conference, ACISP ’97. Sidney, NSW, Australia. July 7–9, 1997. Proceedings. (English) Zbl 0868.00070 Lecture Notes in Computer Science. 1270. Berlin: Springer. xi, 337 p. (1997). MSC: 00B25 94-06 68-06 94A60 68P25 PDF BibTeX XML Cite \textit{V. Varadharajan} (ed.) et al., Information security and privacy. 2nd Australasian conference, ACISP '97. Sidney, NSW, Australia. July 7--9, 1997. Proceedings. Berlin: Springer (1997; Zbl 0868.00070)
Pieprzyk, Josef (ed.); Seberry, Jennifer (ed.) Information security and privacy. First Australasian conference, ACISP ’96, Wollongong, NSW, Australia, June 24–26, 1996. Proceedings. (English) Zbl 0855.00046 Lecture Notes in Computer Science. 1172. Berlin: Springer. ix, 331 p. (1996). MSC: 00B25 94-06 68-06 94A60 68P25 PDF BibTeX XML Cite \textit{J. Pieprzyk} (ed.) and \textit{J. Seberry} (ed.), Information security and privacy. First Australasian conference, ACISP '96, Wollongong, NSW, Australia, June 24--26, 1996. Proceedings. Berlin: Springer (1996; Zbl 0855.00046) Full Text: DOI
Varadharajan, V. Use of trapdoor structures in cryptography. (English) Zbl 0655.94003 Int. J. Comput. Math. 19, No. 2, 153-173 (1986). MSC: 94A60 PDF BibTeX XML Cite \textit{V. Varadharajan}, Int. J. Comput. Math. 19, No. 2, 153--173 (1986; Zbl 0655.94003) Full Text: DOI
Beth, Thomas Kryptographie als Instrument des Datenschutzes. (German) Zbl 0488.94020 Inf.-Spektrum 5, 82-96 (1982). MSC: 94A99 68Q25 PDF BibTeX XML Cite \textit{T. Beth}, Inform. Spektrum 5, 82--96 (1982; Zbl 0488.94020)
Colloquium on database organization. Part 2. (Colloquium databankorganisatie. Deel 2). (English) Zbl 0536.68079 MC Syllabus, 46.2. Amsterdam: Mathematisch Centrum. XII, 237 p. Dfl. 30.45 (Dutch and English) (1981). Reviewer: J.-J.Meyer MSC: 68P20 68P05 68-06 PDF BibTeX XML
Apers, P. M. G. (ed.) Colloquium on database organization. Part 1. (Colloquium databankorganisatie. Deel 1). (English, Dutch) Zbl 0536.68078 MC Syllabus, 46.1. Amsterdam: Mathematisch Centrum. IX, 174 p. Dfl. 22.05 (1981). Reviewer: J.-J.Meyer MSC: 68P20 68P05 68-06 PDF BibTeX XML
Beck, Leland L. A security mechanism for statistical databases. (English) Zbl 0441.68121 ACM Trans. Database Syst. 5, 316-338 (1980). MSC: 68P20 PDF BibTeX XML Cite \textit{L. L. Beck}, ACM Trans. Database Syst. 5, 316--338 (1980; Zbl 0441.68121) Full Text: DOI
Rivest, R. L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. (English) Zbl 0368.94005 Commun. ACM 21, 120-126 (1978). MSC: 94A60 94A62 68P25 PDF BibTeX XML Cite \textit{R. L. Rivest} et al., Commun. ACM 21, 120--126 (1978; Zbl 0368.94005) Full Text: DOI Backlinks: MO