Regular contributions Secure outsourcing of sequence comparisons
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Secure outsourcing of sequence comparisons , 2005, International Journal of Information Security.
[2] Alfred V. Aho,et al. Bounds on the Complexity of the Longest Common Subsequence Problem , 1976, J. ACM.
[3] Michael J. Fischer,et al. The String-to-String Correction Problem , 1974, JACM.
[4] Shin-ichi Kawamura,et al. Fast Server-Aided Secret Computation Protocols for Modular Exponentiation , 1993, IEEE J. Sel. Areas Commun..
[5] Eugene H. Spafford,et al. Secure outsourcing of scientific computations , 2001, Adv. Comput..
[6] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[7] Mike Paterson,et al. A Faster Algorithm Computing String Edit Distances , 1980, J. Comput. Syst. Sci..
[8] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[9] Birgit Pfitzmann,et al. Attacks on Protocols for Server-Aided RSA Computation , 1992, EUROCRYPT.
[10] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[11] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[12] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[13] Chak-Kuen Wong,et al. Bounds for the String Editing Problem , 1976, JACM.
[14] Wenliang Du,et al. Secure and private sequence comparisons , 2003, WPES '03.
[15] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[16] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[17] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.
[18] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[19] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[20] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[21] Jean-Jacques Quisquater,et al. Fast Server-Aided RSA Signatures Secure Against Active Attacks , 1995, CRYPTO.
[22] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[23] Esko Ukkonen,et al. Finding Approximate Patterns in Strings , 1985, J. Algorithms.
[24] D Sankoff,et al. Matching sequences under deletion-insertion constraints. , 1972, Proceedings of the National Academy of Sciences of the United States of America.
[25] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[26] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[27] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[28] Peter H. Sellers,et al. An Algorithm for the Distance Between Two Finite Sequences , 1974, J. Comb. Theory, Ser. A.
[29] Hideki Imai,et al. Speeding Up Secret Computations with Insecure Auxiliary Devices , 1988, CRYPTO.
[30] Gad M. Landau,et al. Introducing efficient parallelism into approximate string matching and a new serial algorithm , 1986, STOC '86.
[31] David Sankoff,et al. Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison , 1983 .