Bounded-width polynomial-size branching programs recognize exactly those languages in NC 1, Journal of Computer and System Sciences, vol.38, pp.1-150, 1989. ,
DOI : 10.1016/0022-0000(89)90037-8
URL : http://doi.org/10.1016/0022-0000(89)90037-8
A minimal model for secure computation (extended abstract), Proceedings of the twenty-sixth annual ACM symposium on Theory of computing , STOC '94, pp.554-563 ,
DOI : 10.1145/195058.195408
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments, Journal of Networks, vol.2, issue.1, 2007. ,
DOI : 10.4304/jnw.2.1.17-26
Privacy Protection for P2P Publish-Subscribe Networks, Security and Protection of Information, pp.63-74, 2005. ,
Privacy-Preserving Filtering and Covering in Content- Based Publish Subscribe Systems, 2009. ,
DOI : 10.1145/2295136.2295164
Conjunctive, Subset, and Range Queries on Encrypted Data, Proceedings of the 4 th Conference on Theory of Cryptography, pp.536-554, 2007. ,
DOI : 10.1007/978-3-540-70936-7_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5164
Hidden-Vector Encryption with Groups of Prime Order, Proceedings of the 2 nd International Conference on Pairing-Based Cryptography, pp.75-88, 2008. ,
DOI : 10.1007/978-3-540-85538-5_5
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Predicate Privacy in Encryption Systems, Proceedings of the 6 th Conference on Theory of Cryptography, pp.457-473, 2009. ,
DOI : 10.1007/978-3-642-00457-5_27
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.2725
Efficient Two-Party Secure Computation on Committed Inputs, EuroCrypt 2007, pp.97-114 ,
DOI : 10.1007/978-3-540-72540-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7883
Fully homomorphic encryption using ideal lattices, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.169-178 ,
DOI : 10.1145/1536414.1536440
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.7592
Founding Cryptography on Oblivious Transfer, Proceedings of the 20 th Annual ACM Symposium on the Theory of Computation (STOC), 1988. ,
Accessible from (Last Accessed 5, 2012. ,
Accessible from (Last Accessed 5, 2012. ,
Private Searching on Streaming Data, Journal of Cryptology, vol.20, issue.4, pp.397-430, 2007. ,
DOI : 10.1007/s00145-007-0565-3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.7131