Evolutionary algorithms In: Handbook of Bioinspired Algorithms and Applications, pp.3-19, 2006. ,
Completeness theorems for noncryptographic fault-tolerant distributed computation, Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp.1-10, 1988. ,
DOI : 10.1145/62212.62213
Some Ideal Secret Sharing Schemes, EUROCRYPT 1989, pp.468-475, 1990. ,
DOI : 10.1007/3-540-46885-4_45
SEPIA: privacypreserving aggregation of multi-domain network events and statistics, Proceedings of the 19th USENIX Conference on Security, p.15, 2010. ,
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing, 2011 31st International Conference on Distributed Computing Systems, pp.393-402, 2011. ,
DOI : 10.1109/ICDCS.2011.84
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme, EUROCRYPT 2000, pp.316-334, 2000. ,
DOI : 10.1007/3-540-45539-6_22
Asynchronous Multiparty Computation: Theory and Implementation, PKC 2009, pp.160-179, 2009. ,
DOI : 10.1007/978-3-642-00468-1_10
Secure Protocols with Asymmetric Trust, ASIACRYPT 2007, pp.357-375, 2007. ,
DOI : 10.1007/978-3-540-76900-2_22
Linpack for android ,
Participatory sensing: applications and architecture [Internet Predictions], IEEE Internet Computing, vol.14, issue.1, pp.12-42, 2010. ,
DOI : 10.1109/MIC.2010.12
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling In: Lagrange Interpolation and Neville's Algorithm, ch. 2, 2003. ,
Cloud4Home -- Enhancing Data Services with @Home Clouds, 2011 31st International Conference on Distributed Computing Systems, pp.539-548, 2011. ,
DOI : 10.1109/ICDCS.2011.74
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Conference on Communications and Multimedia Security, p.121, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
Harnessing the Cloud for Securely Solving Large-Scale Systems of Linear Equations, 2011 31st International Conference on Distributed Computing Systems, pp.549-558, 2011. ,
DOI : 10.1109/ICDCS.2011.41
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp.160-164, 1982. ,
DOI : 10.1109/SFCS.1982.38