W. Dangelmaier, J. Heidenreich, and U. Pape. Proceedings of the 2005 IEEE International Conference on e-Technology,
e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and
e-Service, page 309--314. Washington, DC, USA, IEEE Computer Society, (2005)
A. Yao. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer
Science, page 160--164. Washington, DC, USA, IEEE Computer Society, (1982)
W. Tzeng. PKC '02: Proceedings of the 5th International Workshop on Practice
and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, page 159--171. London, UK, Springer, (2002)
J. Stern. ASIACRYPT '98: Proceedings of the International Conference on the
Theory and Applications of Cryptology and Information Security, page 357--371. London, UK, Springer, (1998)
J. Sakuma, and S. Kobayashi. GECCO '07: Proceedings of the 9th annual conference on Genetic and
evolutionary computation, page 1372--1379. New York, NY, USA, ACM, (2007)
W. Ogata, and K. Kurosawa. Advances in Cryptology - EUROCRYPT 96, volume 1070 of Lecture Notes in Computer Science, page 200-211. Berlin Heidelberg, Springer, (1996)
M. Naor, and B. Pinkas. SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on
Discrete algorithms, page 448--457. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2001)
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
K. Kurosawa, and W. Ogata. ESORICS '02: Proceedings of the 7th European Symposium on Research
in Computer Security, volume 2502 of Lecture Notes in Computer Science, page 24--38. London, UK, Springer, (2002)
F. Kerschbaum, and J. Vayssiere. Proceedings of the 13th International Conference on Parallel and
Distributed Systems, page 1--8. Washington, DC, USA, IEEE Computer Society, (2007)
F. Kerschbaum. Proceedings of the 23rd IFIP International Information Security Conference, volume 278 of IFIP International Federation for Information Processing, page 17-31. Boston, MA, USA, Springer, (2008)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
M. Jakobsson, and A. Juels. ASIACRYPT '00: Proceedings of the 6th International Conference on
the Theory and Application of Cryptology and Information Security, volume 1976 of Lecture Notes in Computer Science, page 162--177. Springer, (London, UK 2000)
S. Izmalkov, S. Micali, and M. Lepinski. Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer
Science, 2005., page 585-594. New York, NJ, USA, IEEE Computer Society, (October 2005)
M. Hirt, and U. Maurer. Proceedings of the sixteenth annual ACM symposium on Principles of
distributed computing, page 25--34. New York, NY, USA, ACM, (1997)
S. Han, and W. Ng. Proceedings of the 9th International Conference on Data Warehousing
and Knowledge Discovery, volume 4654 of Lecture Notes in Computer Science, page 407-417. Berlin, Heidelberg, Springer, (September 2007)
M. Goodrich. Proceedings of the 30th IEEE Symposium on Security and Privacy, page 1-15. Washington, DC, USA, IEEE Computer Society, (May 2009)Forthcoming.
O. Goldreich, S. Micali, and A. Wigderson. Proceedings of the nineteenth annual ACM symposium on Theory of computing, page 218--229. New York, NY, USA, ACM, (1987)
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen. Revised Selected Papers of the 7th International Conference on Information
Security and Cryptology, volume 3506 of Lecture Notes in Computer Science, Berlin Heidelberg, Springer, (2004)
M. Fitzi, J. Garay, S. Gollakota, C. Rangan, and K. Srinathan. Proceedings of the Third Theory of Cryptography Conference, TCC 2006, volume 3876 of Lecture Notes in Computer Science, page 329-342. Berlin Heidelberg, Springer, (2006)
W. Du, and M. Atallah. Proceedings of the 14th IEEE Computer Security Foundations Workshop, page 273-282. Washington, DC, USA, IEEE Computer Society, (2001)
I. Damg\aard, and J. Nielsen. Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, page 247-264. Berlin Heidelberg, Springer, (2003)
I. Damg\aard, and Y. Ishai. Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, page 378-394. Berlin Heidelberg, Springer, (2005)
I. Damg\aard, and Y. Ishai. Advances in Cryptology - CRYPTO 2006, volume 4117 of Lecture Notes in Computer Science, page 501-520. Berlin Heidelberg, Springer, (2006)
R. Cramer, R. Gennaro, and B. Schoenmakers. Advances in Cryptology - EUROCRYPT 97, volume 1233 of Lecture Notes in Computer Science, page 103-118. Berlin Heidelberg, Springer, (1997)
R. Cramer, I. Damg\aard, and J. Nielsen. Advances in Cryptology - EUROCRYPT 2001, volume 2045 of Lecture Notes in Computer Science, page 280-300. Berlin Heidelberg, Springer, (2001)
R. Cramer, I. Damg\aard, and U. Maurer. Advances in Cryptology - EUROCRYPT 2000, volume 1807 of Lecture Notes in Computer Science, page 316-334. Berlin Heidelberg, Springer, (2000)
C. Chu, and W. Tzeng. PKC 2005: Proceedings of the 8th International Workshop on Theory
and Practice in Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 172-183. Berlin, Heidelberg, Springer, (January 2005)
M. Ben-Or, S. Goldwasser, and A. Wigderson. Proceedings of the twentieth annual ACM symposium on Theory of computing, page 1--10. New York, NY, USA, ACM, (1988)
A. Ben-David, N. Nisan, and B. Pinkas. Proceedings of the 15th ACM Conference on Computer and Communications
Security, page 257--266. New York, NY, USA, ACM, (2008)
D. Beaver, S. Micali, and P. Rogaway. Proceedings of the twenty-second annual ACM symposium on Theory of
computing, page 503--513. New York, NY, USA, ACM, (1990)
D. Beaver. CRYPTO 91: Proceedings of the 11th Annual International Cryptology
Conference on Advances in Cryptology, volume 576 of Lecture Notes in Computer Science, page 420--432. London, UK, Springer, (1992)
M. Atallah, F. Kerschbaum, and W. Du. Proceedings of the 2003 ACM workshop on Privacy in the electronic
society, page 39--44. New York, NY, USA, ACM, (2003)
J. Watson, C. Ross, V. Eisele, J. Denton, J. Bins, C. Guerra, D. Whitley, and A. Howe. Proceedings of the 5th International Conference on Parallel Problem
Solving from Nature, volume 1498 of Lecture Notes in Computer Science, page 823-832. Berlin Heidelberg, Springer, (1998)
K. Tan, T. Lee, and E. Khor. Proceedings of the 2001 Congress on Evolutionary Computation, 2, page 979-986. Piscataway, NJ, USA, IEEE Computer Society, (2001)
W. Spears, K. Jong, T. Bäck, D. Fogel, and H. de Garis. ECML '93: Proceedings of the European Conference on Machine Learning, page 442--459. London, UK, Springer, (1993)