SipHash: A Fast Short-Input PRF, Progress in Cryptology -INDOCRYPT 2012, pp.489-508, 2012. ,
DOI : 10.1007/978-3-642-34931-7_28
URL : http://cr.yp.to/siphash/siphash-20120918.pdf
Scalable Bloom Filters, Information Processing Letters, vol.101, issue.6, pp.255-261, 2007. ,
DOI : 10.1016/j.ipl.2006.10.007
Short paper, Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, WiSec '14, pp.231-236, 2014. ,
DOI : 10.1145/2627393.2627399
URL : https://hal.archives-ouvertes.fr/hal-00997716
Alice in warningland: A largescale field study of browser security warning effectiveness, Proceedings of the 22th USENIX Security Symposium, pp.257-272, 2013. ,
Your reputation precedes you: History, reputation, and the chrome malware warning, Tenth Symposium on Usable Privacy and Security , SOUPS 2014, pp.113-128, 2014. ,
BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters, Stabilization, Safety, and Security of Distributed Systems -14th International Symposium, SSS 2012. Proceedings, pp.202-216, 2012. ,
Sanitization of Call Detail Records via Differentially-Private Bloom Filter, Data and Applications Security and Privacy XXIX -29th Annual IFIP WG 11.3 Working Conference Proceedings, pp.223-230, 2015. ,
Approximate counts and quantiles over sliding windows, Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '04 ,
DOI : 10.1145/1055558.1055598
Building a Dynamic Reputation System for DNS, 19th USENIX Security Symposium Proceedings, pp.273-290, 2010. ,
smhasher -Test your hash functions, 2010. ,
Hashcash -A Denial of Service Counter-Measure, 2002. ,
Remote timing attacks are practical, Proceedings of the 12th USENIX Security Symposium, 2003. ,
DOI : 10.1016/j.comnet.2005.01.010
URL : http://crypto.stanford.edu/~dabo/papers/ssl-timing.ps
Security and implementation analysis of the similarity digest sdhash, First International Baltic Conference on Network Security & Forensics, p.2012 ,
Privacy-Enhanced Searches Using Encrypted Bloom Filters, DIMACS/PORTIA Workshop on Privacy- Preserving Data Mining, pp.274-285, 2004. ,
A Fast and Compact Method for Unveiling Significant Patterns in High Speed Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.6-12, 2007. ,
DOI : 10.1109/INFCOM.2007.220
Min-Wise Independent Permutations, Journal of Computer and System Sciences, vol.60, issue.3, pp.327-336, 1998. ,
DOI : 10.1006/jcss.1999.1690
URL : https://doi.org/10.1006/jcss.1999.1690
Informed content delivery across adaptive overlay networks, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication -ACM SIGCOMM 2002, pp.47-60, 2002. ,
DOI : 10.1145/633025.633031
URL : http://www.eecs.harvard.edu/~michaelm/CS222/informed.pdf
On the false-positive rate of Bloom filters, Information Processing Letters, vol.108, issue.4, pp.210-213, 2008. ,
DOI : 10.1016/j.ipl.2008.05.018
Uniform Resource Identifier (URI): Generic Syntax, 2005. ,
DOI : 10.17487/rfc3986
Uniform Resource Locators (URL) RFC 1738, RFC Editor, 1994. ,
DOI : 10.17487/rfc1738
URL : http://ietfreport.isoc.org/rfc/PDF/rfc-pdf/rfc1738.pdf
Space/Time Trade-offs in Hash Coding with Allowable Errors, Commun. ACM, vol.13, issue.7, pp.422-426, 1970. ,
Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, 2005. ,
DOI : 10.1080/15427951.2004.10129096
De-anonymizing Users of French Political Forums, 2013. ,
On the Vulnerability of Hardware Hash Tables to Sophisticated Attacks, Lecture Notes in Computer Science, vol.1, issue.7289, pp.135-148, 2012. ,
DOI : 10.1007/978-3-642-30045-5_11
URL : https://hal.archives-ouvertes.fr/hal-01531139
Data Structures with Unpredictable Timing, ESORICS, pp.456-471, 2009. ,
DOI : 10.1214/aoms/1177692631
URL : http://www.cs.unc.edu/~reiter/papers/2009/ESORICS.pdf
Remote Timing Attacks Are Still Practical, Computer Security -ESORICS 2011 -16th European Symposium on Research in Computer Security Proceedings, pp.355-371, 2011. ,
DOI : 10.1007/BF02579403
URL : http://eprint.iacr.org/2011/232.pdf
The Pitfalls of Hashing for Privacy, 2016. ,
Exact and approximate membership testers, Proceedings of the tenth annual ACM symposium on Theory of computing , STOC '78, pp.59-65, 1978. ,
DOI : 10.1145/800133.804332
Exploiting Unix File-System Races via Algorithmic Complexity Attacks, 2009 30th IEEE Symposium on Security and Privacy, pp.27-41, 2009. ,
DOI : 10.1109/SP.2009.10
URL : http://www.cs.sunysb.edu/~rob/papers/races2.pdf
Private Information Retrieval, Annual Symposium on Foundations of Computer Science, FOCS 1995, 1995. ,
Private information retrieval by keywords, 1998. ,
Blind Signatures for Untraceable Payments, Advances in Cryptology: Proceedings of CRYPTO '82, pp.199-203, 1982. ,
DOI : 10.1007/978-1-4757-0602-4_18
Single Database Private Information Retrieval with Logarithmic Communication, Information Security and Privacy, 2004. ,
DOI : 10.1007/978-3-540-27800-9_5
URL : http://eprint.iacr.org/2004/036.ps.gz
Tracking Long Duration Flows in Network Traffic, 2010 Proceedings IEEE INFOCOM, pp.206-210, 2010. ,
DOI : 10.1109/INFCOM.2010.5462244
URL : http://www-users.cs.umn.edu/~yjin/papers/infocommini10.pdf
The Bloomier Filter: An Efficient Data Structure for Static Support Lookup Tables, Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA '04, pp.30-39, 2004. ,
Detection and analysis of drive-by-download attacks and malicious JavaScript code, Proceedings of the 19th international conference on World wide web, WWW '10, pp.281-290, 2010. ,
DOI : 10.1145/1772690.1772720
Introduction to Algorithms, Third Edition, 2009. ,
Spectral bloom filters, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.241-252, 2003. ,
DOI : 10.1145/872757.872787
An improved data stream summary: the count-min sketch and its applications, Journal of Algorithms, vol.55, issue.1, pp.58-75, 2005. ,
DOI : 10.1016/j.jalgor.2003.12.001
URL : http://dimacs.rutgers.edu/~graham/pubs/papers/cm-latin.pdf
Computationally Private Information Retrieval with Polylogarithmic Communication, Advances in Cryptology? EUROCRYPT '99Com15] Common Crawl. Online, 1999. ,
Denial of Service through Regular Expressions, USENIX Security Symposium: Work-In-Progress Reports, 2003. ,
Universal classes of hash functions (Extended Abstract), Proceedings of the ninth annual ACM symposium on Theory of computing , STOC '77, pp.106-112, 1977. ,
DOI : 10.1145/800105.803400
Denial of Service via Algorithmic Complexity Attacks, USENIX Security Symposium, pp.3-3, 2003. ,
Recommendation for Applications Using Approved Hash Algorithms, 2012. ,
DOI : 10.6028/nist.sp.800-107r1
The Tangled Web of Password Reuse, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23357
Fast and Private Computation of Cardinality of Set Intersection and Union, Cryptology and Network Security, 2012. ,
DOI : 10.1007/978-3-642-35404-5_17
Practical Private Set Intersection Protocols with Linear Complexity, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, 2010. ,
Experimenting with Fast Private Set Intersection, Trust and Trustworthy Computing, 2012. ,
DOI : 10.1007/978-3-642-30921-2_4
When private set intersection meets big data, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516701
URL : https://strathprints.strath.ac.uk/44686/1/https_eprint.iacr.org_2013_515.pdf
RFC 1951: DEFLATE compressed data format specification version 1.3, 1996. ,
Calibrating Noise to Sensitivity in Private Data Analysis, Theory of Cryptography , Third Theory of Cryptography Conference Proceedings, pp.265-284, 2006. ,
DOI : 10.1007/11681878_14
URL : http://repository.cmu.edu/cgi/viewcontent.cgi?article=1139&context=jpc
Pricing via Processing or Combatting Junk Mail, Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '92, pp.139-147, 1993. ,
DOI : 10.1007/3-540-48071-4_10
URL : http://www.wisdom.weizmann.ac.il/~naor/PAPERS/pvp.pdf
Approximately detecting duplicates for streaming data using stable bloom filters, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, pp.25-36, 2006. ,
DOI : 10.1145/1142473.1142477
URL : http://webdocs.cs.ualberta.ca/~drafiei/papers/DupDetExt.pdf
Efficient Robust Private Set Intersection, Applied Cryptography and Network Security, 2009. ,
DOI : 10.1109/SFCS.1982.38
Differential Privacy, 33rd International Colloquium on Automata, Languages and Programming, pp.1-12, 2006. ,
DOI : 10.1007/11787006_1
You've been warned, Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems , CHI '08, pp.1065-1074, 2008. ,
DOI : 10.1145/1357054.1357219
PrivEx, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1068-1079, 2014. ,
DOI : 10.1007/978-3-642-03356-8_8
Routing in Random Ad-Hoc Networkds: Provably Better than Worst-case, 2008. ,
RAPPOR, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.1054-1067, 2002. ,
DOI : 10.1145/1806689.1806794
URL : http://arxiv.org/pdf/1407.6981
The Importance of Being Earnest [In Security Warnings], Financial Cryptography and Data Security -17th International Conference, FC 2013, pp.52-59, 2013. ,
DOI : 10.1007/978-3-642-39884-1_5
Analytics -Privacy Statement. Online, Accessed on 15, 2015. ,
Summary cache: a scalable wide-area Web cache sharing protocol, IEEE/ACM Transactions on Networking, vol.8, issue.3, pp.281-293, 2000. ,
DOI : 10.1109/90.851975
Controlled Data Sharing for Collaborative Predictive Blacklisting, Detection of Intrusions and Malware, and Vulnerability Assessment -12th International Conference Proceedings, pp.327-349, 2015. ,
DOI : 10.1007/978-3-319-20550-2_17
URL : http://arxiv.org/pdf/1502.05337
An Introduction to Probability Theory and Its Applications, 1968. ,
On the Potential of Proactive Domain Blacklisting, LEET, 2010. ,
Theory and practice of probabilistic counting algorithms (abstract of invited talk), Workshop on Analytic Algorithmics and Combinatorics -ANALC 2004, 2004. ,
Efficient Private Matching and Set Intersection, Advances in Cryptology -EUROCRYPT 2004, 2004. ,
Power-conserving computation of order-statistics over sensor networks, Proceedings of the twenty-third ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems , PODS '04, pp.275-285, 2004. ,
DOI : 10.1145/1055558.1055597
URL : https://repository.upenn.edu/cgi/viewcontent.cgi?article=1206&context=cis_papers
The Power of Evil Choices in Bloom Filters, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015. ,
DOI : 10.1109/DSN.2015.21
URL : https://hal.archives-ouvertes.fr/hal-01082158
A Privacy Analysis of Google and Yandex Safe Browsing, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016. ,
DOI : 10.1109/DSN.2016.39
URL : https://hal.archives-ouvertes.fr/hal-01120186
False negative problem of counting bloom filter. Knowledge and Data Engineering, IEEE Transactions on, vol.22, issue.5, pp.651-664, 2010. ,
Secure Indexes. Cryptology ePrint Archive, Report, vol.216216, 2003. ,
Run-length encodings (Corresp, IEEE Transactions on Information Theory, vol.12, issue.3, 1966. ,
Improving the Robustness of Private Information Retrieval, IEEE Symposium on Security and Privacy, p.7, 2007. ,
We knew the web was big, 2008. ,
Google Safe Browsing Service in Mozilla Firefox Version 3, 2012. ,
Poorly anonymized logs reveal NYC cab drivers' detailed whereabouts, Accessed, vol.21, pp.7-16, 2014. ,
Google Chrome Privacy Notice. https://www.google.com/intl, 2014. ,
Safe Browsing Lookup API. https://developers.google. com/safe-browsing/lookup_guide, 2015. ,
Single-Database Private Information Retrieval with Constant Communication Rate, ICALP, 2005. ,
DOI : 10.1007/11523468_65
URL : http://cgis.cs.umd.edu/~gasarch/pir/logn.pdf
Adish Singla, Srdjan Capkun, and Vincent Lenders Quantifying Web-Search Privacy, ACM SIGSAC Conference on Computer and Communications Security, pp.966-977, 2014. ,
DOI : 10.1145/2660267.2660367
Path-quality monitoring in the presence of adversaries, International Conference on Measurement and Modeling of Computer Systems, SIGMET- RICS 2008, pp.193-204, 2008. ,
Internet: Growth dynamics of the World-Wide Web, Nature, vol.401, issue.6749, pp.131-131, 1999. ,
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols, NDSS, 2012. ,
Adversarial machine learning, Proceedings of the 4th ACM workshop on Security and artificial intelligence, AISec '11, pp.43-58, 2011. ,
DOI : 10.1145/2046684.2046692
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries Uncovering Global Icebergs in Distributed Streams: Results and Implications, Theory of Cryptography, pp.84-110, 2008. ,
Efficient Set Operations in the Presence of Malicious Adversaries, Journal of Cryptology, vol.25, issue.3, p.2012 ,
Honest-Verifier Private Disjointness Testing Without Random Oracles, Privacy Enhancing Technologies, pp.277-294, 2006. ,
DOI : 10.1007/11957454_16
A Hash Function for Hash Table Lookup, 1996. ,
Practical applications of bloom filters to the NIST RDS and hard drive triage, Twenty-Fourth Annual Computer Security Applications Conference, pp.8-12, 2008. ,
"I know what you did last summer", Proceedings of the sixteenth ACM conference on Conference on information and knowledge management , CIKM '07, pp.909-914, 2007. ,
DOI : 10.1145/1321440.1321573
Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection, Theory of Cryptography, 2009. ,
DOI : 10.1007/3-540-46766-1_9
Honeywords, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516671
URL : http://dspace.mit.edu/bitstream/1721.1/90627/1/Rivest_Honeywords.pdf
SAuth, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516746
Robust Aggregation in Sensor Networks, IEEE Data Eng. Bull, vol.28, issue.1, pp.26-32, 2005. ,
Google's Safe Browsing Service is Killing Your Privacy. Online, 2014. ,
Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity, Data and Applications Security and Privacy XXV -25th Annual IFIP WG 11.3 Conference, pp.60-75, 2011. ,
DOI : 10.1007/978-3-642-22348-8_7
URL : https://hal.archives-ouvertes.fr/hal-01586579
Private Password Auditing -Short Paper, Technology and Practice of Passwords -International Conference on Passwords, PASSWORDS'14, 2014. ,
DOI : 10.1007/978-3-319-24192-0_9
URL : https://hal.archives-ouvertes.fr/hal-01119953
A Survey of Alerting Websites: Risks and Solutions, ICT Systems Security and Privacy Protection -30th IFIP TC 11 International Conference, 2015. ,
DOI : 10.1007/978-3-319-18467-8_9
URL : https://hal.archives-ouvertes.fr/hal-01199703
Short Paper: Performances of cryptographic accumulators, 39th IEEE Conference on Local Computer Networks, pp.8-11, 2014. ,
DOI : 10.1109/lcn.2014.6925793
URL : http://hal.univ-grenoble-alpes.fr/docs/00/99/94/32/PDF/KLL_LCN14full.pdf
Bloom Filters in Adversarial Settings, 2016. ,
Less hashing, same performance: Building a better Bloom filter. Random Struct, Algorithms, vol.33, issue.2, pp.187-218, 2008. ,
DOI : 10.1002/rsa.20208
URL : http://www.eecs.harvard.edu/~michaelm/postscripts/rsa2008.pdf
Cryptocash, cryptocurrencies, and cryptocontracts. Designs, Codes and Cryptography Replication is Not Needed: Single Database, Computationally-private Information Retrieval, Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997. [KS05] Lea Kissner and Dawn Song. Privacy-Preserving Set Operations. In Advances in Cryptology ? CRYPTO 2005, pp.87-102, 2005. ,
DOI : 10.1007/s10623-015-0148-5
URL : https://link.springer.com/content/pdf/10.1007%2Fs10623-015-0148-5.pdf
Multiple Implementations Denial-of- Service via Hash Algorithm Collision, 2011. ,
Remedying Web Hijacking, Proceedings of the 25th International Conference on World Wide Web, WWW '16, pp.1009-1019, 2016. ,
DOI : 10.1145/2046707.2046763
An Oblivious Transfer Protocol with Log-Squared Communication, ISC, 2005. ,
DOI : 10.1007/11556992_23
URL : http://eprint.iacr.org/2004/063.ps.gz
Cassandra, ACM SIGOPS Operating Systems Review, vol.44, issue.2, pp.35-40, 2010. ,
DOI : 10.1145/1773912.1773922
SpyProxy: Execution-based Detection of Malicious Web Content, Proceedings of the 16th USENIX Security Symposium, 2007. ,
XPIRe: Private Information Retrieval for Everyone, IACR Cryptology ePrint Archive, vol.2014, p.1025, 1025. ,
A Crawler-based Study of Spyware in the Web, Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, 2006. ,
McAfee Site Advisor FAQ. https://kc.mcafee.com/corporate/ index?page=content&id=KB73457, 2015. ,
McAfee Site Advisor Live, 2015. ,
A Killer Adversary for Quicksort, Softw. Pract. Exper, vol.29, issue.4, pp.341-344, 1999. ,
Efficient Private Statistics with Succinct Sketches, Proceedings 2016 Network and Distributed System Security Symposium, 1508. ,
DOI : 10.14722/ndss.2016.23175
URL : http://arxiv.org/pdf/1508.06110
Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, SenSys '12, pp.281-294 ,
DOI : 10.1145/2426656.2426685
URL : http://www.cs.uic.edu/~jakob/papers/musa-sensys12.pdf
A digital signature based on a conventional encryption function, A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology, CRYPTO '87, pp.369-378, 1988. ,
A fast private information retrieval protocol, 2008 IEEE International Symposium on Information Theory, 2008. ,
DOI : 10.1109/ISIT.2008.4595308
URL : https://hal.archives-ouvertes.fr/hal-00335222
SmartScreen Application Reputationsmartscreen-174-application- reputation-in-ie9.aspx, 2011. [Mic11b] Microsoft. SmartScreen: Authenticode Code Signingauthenticode- code-signing-for-developers-for-file-downloads-buildingsmartscreen-application-reputation .aspx, Mic16] Microsoft. Windows Logo, 2011. ,
Delta encoding in HTTP, RFC, vol.3229, 2002. ,
Private Membership Test for Bloom Filters, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.515-522, 2015. ,
DOI : 10.1109/Trustcom.2015.414
Domain names -implementation and specification, RFC 1035 (INTERNET STANDARD), pp.4034-4035, 1183. ,
Building and measuring privacy-preserving predictive blacklists, 1512. ,
Randomized Algorithms, 1995. ,
A taxonomy of DDoS attack and DDoS defense mechanisms, 48th Annual IEEE Symposium on Foundations of Computer Science, pp.39-53, 2004. ,
DOI : 10.1145/997150.997156
Handbook of Applied Cryptography, 1996. ,
DOI : 10.1201/9781439821916
Bitcoin: A Peer-to-Peer Electronic Cash System. www. bitcoin.org, 2011. ,
PhoneyC: A Virtual Client Honeypot, Proceedings of the 2nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09, 2009. ,
Synopsis Diffusion for Robust Aggregation in Sensor Networks, TOSN, vol.4, issue.2, 2008. ,
DOI : 10.1145/1340771.1340773
URL : http://www.intel-research.net/Publications/Pittsburgh/101220041304_267.pdf
Cryptographically Secure Bloom- Filters, Transactions on Data Privacy, vol.2, issue.2, pp.131-139, 2009. ,
Stranger danger, Proceedings of the 23rd international conference on World wide web, WWW '14, pp.51-62, 2014. ,
DOI : 10.1145/2566486.2567983
Fast dictionary attacks on passwords using time-space tradeoff, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102168
URL : http://www.cs.utexas.edu/~shmat/shmat_ccs05pwd.ps
Bloom Filters in Adversarial Environments, Advances in Cryptology -CRYPTO 2015 -35th Annual Cryptology Conference Proceedings, Part II, pp.565-584, 2015. ,
DOI : 10.1007/978-3-662-48000-7_28
URL : http://arxiv.org/pdf/1412.8356
Fast accumulated hashing, Fast Software Encryption - FSE 1996, 1996. ,
DOI : 10.1007/3-540-60865-6_45
Revisiting the Computational Practicality of Private Information Retrieval, Financial Cryptography and Data Security, 2012. ,
DOI : 10.1109/ISIT.2006.261651
Web Crawling, on online behavioral advertising, pp.175-246, 2010. ,
DOI : 10.1561/1500000017
Bro: a system for detecting network intruders in real-time, Proceedings of the 7th Conference on USENIX Security Symposium -Volume 7, SSYM'98, pp.3-3, 1998. ,
DOI : 10.1016/S1389-1286(99)00112-7
Designing and Attacking Port Scan Detection Tools Phrack Magazine, 1998. ,
Anonymity, Unobservability, and Pseudonymity ??? A Proposal for Terminology, In International Workshop on Design Issues in Anonymity and Unobservability Lecture Notes in Computer Science, pp.1-9, 2000. ,
DOI : 10.1007/3-540-44702-4_1
All Your iFRAMEs Point to Us, Proceedings of the 17th Conference on Security Symposium, SS'08, pp.1-15, 2008. ,
CLAMP: Practical Prevention of Large-Scale Data Leaks, IEEE Symposium on Security and Privacy, 2009. ,
Tolerating Overload Attacks Against Packet Capturing Systems, USENIX Annual Technical Conference, pp.197-202, 2012. ,
Cuckoo hashing, Journal of Algorithms, vol.51, issue.2, pp.122-144, 2004. ,
DOI : 10.1016/j.jalgor.2003.12.002
Safe Browsing -Protecting Web Users for 5 Years and Counting, 2012. ,
Mining top-K frequent itemsets through progressive sampling, Data Mining and Knowledge Discovery, vol.13, issue.2, pp.310-326, 2010. ,
DOI : 10.1017/CBO9780511813603
URL : http://arxiv.org/pdf/1006.5235
Cache-, Hash-, and Spaceefficient Bloom Filters, J. Exp. Algorithmics, p.14, 2010. ,
DOI : 10.1007/978-3-540-72845-0_9
???Balls into Bins??? ??? A Simple and Tight Analysis, Proceedings of the Second International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM '98, pp.159-170, 1998. ,
DOI : 10.1007/3-540-49543-6_13
Cache digests, Computer Networks and ISDN Systems, pp.22-23, 1998. ,
DOI : 10.1016/S0169-7552(98)00251-7
Secure distributed data-mining and its application to large-scale network measurements, ACM SIGCOMM Computer Communication Review, vol.36, issue.1, pp.7-14, 2006. ,
DOI : 10.1145/1111322.1111326
URL : http://www.cs.utexas.edu/~yzhang/papers/mining-ccr06.pdf
Mathematical Correction for Fingerprint Similarity Measures to Improve Chemical Retrieval, Journal of Chemical Information and Modeling, vol.47, issue.3, pp.952-964, 2007. ,
DOI : 10.1021/ci600526a
On the Practicality of Private Information Retrieval, Proceedings of the Network and Distributed System Security Symposium ? NDSS 2007, 2007. ,
Denial-of-Service Attack, Handbook of Information Security, 2005. ,
A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis, 2011 IEEE International Conference on Communications (ICC), pp.1-5, 2011. ,
DOI : 10.1109/icc.2011.5962718
Towards an Information Theoretic Metric for Anonymity, Privacy Enhancing Technologies, Second International Workshop, pp.41-53, 2002. ,
DOI : 10.1007/3-540-36467-6_4
URL : http://www.cl.cam.ac.uk/users/aas23/papers_aas/set.ps
Graph-based synopses for relational selectivity estimation, Proceedings of the 2006 ACM SIGMOD international conference on Management of data , SIGMOD '06, pp.205-216, 2006. ,
DOI : 10.1145/1142473.1142497
NSA uses Google cookies to pinpoint targets for hacking. The Washington Post, 2013. ,
BloomCasting: Security in Bloom Filter Based Multicast, Nordic Conference on Secure IT Systems, pp.1-16, 2010. ,
hashcat advanced password recovery, 2016. ,
A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice, International Journal of Network Management, vol.3, issue.2, pp.271-293, 2010. ,
DOI : 10.1002/nem.748
URL : https://hal.archives-ouvertes.fr/hal-00565751
Blackhash software, 2014. ,
The Circle Game, Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS '17 ,
DOI : 10.1109/SP.2015.45
Hash pile ups: Using collisions to identify unknown hash functions, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-6, 2012. ,
DOI : 10.1109/CRISIS.2012.6378946
URL : http://www.maths.tcd.ie/~dwmalone/p/crisis2012.pdf
Theory and Practice of Bloom Filters for Distributed Systems, IEEE Communications Surveys & Tutorials, vol.14, issue.1, pp.131-155, 2006. ,
DOI : 10.1109/SURV.2011.031611.00024
Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, vol.13, issue.4, pp.593-622, 2005. ,
DOI : 10.3233/JCS-2005-13401
URL : http://www.cerias.purdue.edu/ssl/techreports-ssl/2005-136.pdf
Personal Communication, 2015. Security team at Mozilla Firefox ,
New streaming algorithms for fast detection of superspreaders, Network and Distributed System Security Symposium, NDSS 2005, 2005. ,
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities, NDSS, 2006. ,
Squid: The Definitive Guide . O'Reilly Media, WOT15a] WOT Services Ltd. Privacy Policy, 2004. ,
Web of Trust, 2015. ,
SMTP Extension for Internationalized Email, RFC, vol.6531, 2012. ,
DOI : 10.17487/rfc6531
Enigma: Decentralized Computation Platform with Guaranteed Privacy ,
Online identification of hierarchical heavy hitters, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.101-114, 2004. ,
DOI : 10.1145/1028788.1028802