Efficient Private Publish-Subscribe Systems
暂无分享,去创建一个
[1] Kurt Rothermel,et al. Providing basic security mechanisms in broker-less publish/subscribe systems , 2010, DEBS '10.
[2] Matthew Green,et al. Blind Identity-Based Encryption and Simulatable Oblivious Transfer , 2007, ASIACRYPT.
[3] Marek Klonowski,et al. Privacy Protection for P 2 P Publish-Subscribe Networks ? , 2005 .
[4] Bruno Crispo,et al. Design and implementation of a confidentiality and access control solution for publish/subscribe systems , 2012, Comput. Networks.
[5] Joud Khoury,et al. P3S: A Privacy Preserving Publish-Subscribe Middleware , 2012, Middleware.
[6] Domenico Cotroneo,et al. On reliability in publish/subscribe services , 2013, Comput. Networks.
[7] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[8] Rafail Ostrovsky,et al. Conditional Oblivious Transfer and Timed-Release Encryption , 1999, EUROCRYPT.
[9] Elisa Bertino,et al. A Privacy-Enhancing Content-Based Publish/Subscribe System Using Scalar Product Preserving Transformations , 2010, DEXA.
[10] Pascal Felber,et al. Thrifty privacy: efficient support for privacy-preserving publish/subscribe , 2012, DEBS.
[11] Vincenzo Iovino,et al. Hidden-Vector Encryption with Groups of Prime Order , 2008, Pairing.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[14] Craig Costello,et al. Fixed Argument Pairings , 2010, LATINCRYPT.
[15] E. Bertino,et al. Privacy-Preserving Filtering and Covering in Content-Based Publish Subscribe Systems , 2009 .
[16] Mahesh Balakrishnan,et al. Contrail: Enabling Decentralized Social Networks on Smartphones , 2011, Middleware.
[17] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[18] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[19] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[20] Nigel P. Smart,et al. On Computing Products of Pairings , 2006, IACR Cryptol. ePrint Arch..
[21] Ari Juels,et al. Dining Cryptographers Revisited , 2004, EUROCRYPT.
[22] Atul Prakash,et al. Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments , 2007, J. Networks.
[23] Elisa Bertino,et al. Efficient privacy preserving content based publish subscribe systems , 2012, SACMAT '12.
[24] Paulo S. L. M. Barreto,et al. Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America , 2010 .