5PM: Secure Pattern Matching
暂无分享,去创建一个
[1] Benny Pinkas,et al. Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Richard M. Karp,et al. Efficient Randomized Pattern-Matching Algorithms , 1987, IBM J. Res. Dev..
[5] Antonino Tumeo,et al. Accelerating DNA analysis applications on GPU clusters , 2010, 2010 IEEE 8th Symposium on Application Specific Processors (SASP).
[6] Emiliano De Cristofaro,et al. Countering GATTACA: efficient and secure testing of fully-sequenced human genomes , 2011, CCS '11.
[7] Keith B. Frikken. Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation , 2009, DBSec.
[8] Donald E. Knuth,et al. Fast Pattern Matching in Strings , 1977, SIAM J. Comput..
[9] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[10] Silvio Micali,et al. CS proofs , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[11] Damien Vergnaud. Efficient and Secure Generalized Pattern Matching via Fast Fourier Transform , 2011, AFRICACRYPT.
[12] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[13] Yuval Ishai,et al. Founding Cryptography on Oblivious Transfer - Efficiently , 2008, CRYPTO.
[14] Carmit Hazay,et al. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Christopher W. V. Hogue,et al. Kangaroo – A pattern-matching program for biological sequences , 2002, BMC Bioinformatics.
[17] Ivan Damgård,et al. Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost , 2010, IACR Cryptol. ePrint Arch..
[18] I. Damgård,et al. The protocols. , 1989, The New Zealand nursing journal. Kai tiaki.
[19] Babak Sadeghiyan,et al. An Efficient Protocol for Oblivious DFA Evaluation and Applications , 2012, CT-RSA.
[20] Heiko Hoffmann,et al. Fast pattern matching with time-delay neural networks , 2011, The 2011 International Joint Conference on Neural Networks.
[21] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[22] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[23] Ronald Cramer,et al. A Secure and Optimally Efficient Multi-Authority Election Scheme ( 1 ) , 2000 .
[24] Eli Ben-Sasson,et al. Robust PCPs of Proximity, Shorter PCPs, and Applications to Coding , 2004, SIAM J. Comput..
[25] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[26] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[27] Jignesh M. Patel,et al. Structural joins: a primitive for efficient XML query pattern matching , 2002, Proceedings 18th International Conference on Data Engineering.
[28] Richard E. Overill,et al. Foundations of Cryptography: Basic Tools , 2002, J. Log. Comput..
[29] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[30] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[31] Felix Brandt,et al. Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption , 2005, ICISC.
[32] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[33] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[34] Kedar S. Namjoshi,et al. Robust and Fast Pattern Matching for Intrusion Detection , 2010, 2010 Proceedings IEEE INFOCOM.
[35] Carmit Hazay,et al. Text Search Protocols with Simulation Based Security , 2010, Public Key Cryptography.
[36] Stefan Katzenbeisser,et al. Privacy preserving error resilient dna searching through oblivious automata , 2007, CCS '07.
[37] Rafail Ostrovsky,et al. Round-Optimal Secure Two-Party Computation , 2004, CRYPTO.
[38] Tsung-Hsi Tsai,et al. Average case analysis of the Boyer‐Moore algorithm , 2006, Random Struct. Algorithms.
[39] Jonathan Katz,et al. Secure text processing with applications to private DNA matching , 2010, CCS '10.
[40] Joe Kilian,et al. A note on efficient zero-knowledge proofs and arguments (extended abstract) , 1992, STOC '92.