W. Dangelmaier, J. Heidenreich, and U. Pape. Proceedings of the 2005 IEEE International Conference on e-Technology,
e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and
e-Service, page 309--314. Washington, DC, USA, IEEE Computer Society, (2005)
W. Tzeng. PKC '02: Proceedings of the 5th International Workshop on Practice
and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, page 159--171. London, UK, Springer, (2002)
M. Naor, and B. Pinkas. SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on
Discrete algorithms, page 448--457. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2001)
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
A. Ben-David, N. Nisan, and B. Pinkas. Proceedings of the 15th ACM Conference on Computer and Communications
Security, page 257--266. New York, NY, USA, ACM, (2008)
G. Rudolph. Proceedings of the International Symposium on Information Science
Innovations in Engineering of Natural and Artificial Intelligent
Systems (ISI 2001), page 818-822. Millet, AB, CA, ICSC Academic Press, (2001)