@article{DBLP:journals/iacr/PiskeGNT24,
author = {Lucas Piske and
Jeroen van de Graaf and
Anderson C. A. Nascimento and
Ni Trieu},
title = {Shared {OT} and Its Applications to Unconditional Secure Integer Equality,
Comparison and Bit-Decomposition},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {963},
year = {2024},
url = {https://eprint.iacr.org/2024/963},
timestamp = {Mon, 01 Jul 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/PiskeGNT24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/MelansonMKNC23,
author = {David Melanson and
Ricardo Maia and
Hee{-}Seok Kim and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Secure Multi-Party Computation for Personalized Human Activity Recognition},
journal = {Neural Process. Lett.},
volume = {55},
number = {3},
pages = {2127--2153},
year = {2023},
url = {https://doi.org/10.1007/s11063-023-11182-8},
doi = {10.1007/S11063-023-11182-8},
timestamp = {Fri, 10 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/npl/MelansonMKNC23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/de/GolobPDDLCN23,
author = {Steven Golob and
Sikha Pentyala and
Rafael Dowsley and
Bernardo David and
Mario Larangeira and
Martine De Cock and
Anderson C. A. Nascimento},
title = {A Decentralized Information Marketplace Preserving Input and Output
Privacy},
booktitle = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023,
Seattle, WA, USA, 18 June 2023},
pages = {1--6},
publisher = {{ACM}},
year = {2023},
url = {https://doi.org/10.1145/3600046.3600047},
doi = {10.1145/3600046.3600047},
timestamp = {Fri, 10 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/de/GolobPDDLCN23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-13529,
author = {Tucker Stewart and
Bin Yu and
Anderson C. A. Nascimento and
Juhua Hu},
title = {Enhancing Peak Network Traffic Prediction via Time-Series Decomposition},
journal = {CoRR},
volume = {abs/2303.13529},
year = {2023},
url = {https://doi.org/10.48550/arXiv.2303.13529},
doi = {10.48550/ARXIV.2303.13529},
eprinttype = {arXiv},
eprint = {2303.13529},
timestamp = {Fri, 14 Apr 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2303-13529.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaiaRPDCNJ23,
author = {Ricardo J. M. Maia and
Dustin Ray and
Sikha Pentyala and
Rafael Dowsley and
Martine De Cock and
Anderson C. A. Nascimento and
Ricardo Jacobi},
title = {An End-to-End Framework for Private {DGA} Detection as a Service},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1644},
year = {2023},
url = {https://eprint.iacr.org/2023/1644},
timestamp = {Mon, 13 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/MaiaRPDCNJ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AdamsCCDMNRS22,
author = {Samuel Adams and
Chaitali Choudhary and
Martine De Cock and
Rafael Dowsley and
David Melanson and
Anderson C. A. Nascimento and
Davis Railsback and
Jianwei Shen},
title = {Privacy-preserving training of tree ensembles over continuous data},
journal = {Proc. Priv. Enhancing Technol.},
volume = {2022},
number = {2},
pages = {205--226},
year = {2022},
url = {https://doi.org/10.2478/popets-2022-0042},
doi = {10.2478/POPETS-2022-0042},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/popets/AdamsCCDMNRS22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ResendeRDNA22,
author = {Amanda Cristina Davi Resende and
Davis Railsback and
Rafael Dowsley and
Anderson C. A. Nascimento and
Diego F. Aranha},
title = {Fast Privacy-Preserving Text Classification Based on Secure Multiparty
Computation},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {17},
pages = {428--442},
year = {2022},
url = {https://doi.org/10.1109/TIFS.2022.3144007},
doi = {10.1109/TIFS.2022.3144007},
timestamp = {Sat, 09 Apr 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tifs/ResendeRDNA22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-02625,
author = {Sikha Pentyala and
Davis Railsback and
Ricardo Maia and
Rafael Dowsley and
David Melanson and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Training Differentially Private Models with Secure Multiparty Computation},
journal = {CoRR},
volume = {abs/2202.02625},
year = {2022},
url = {https://arxiv.org/abs/2202.02625},
eprinttype = {arXiv},
eprint = {2202.02625},
timestamp = {Fri, 10 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2202-02625.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11584,
author = {Sikha Pentyala and
Nicola Neophytou and
Anderson C. A. Nascimento and
Martine De Cock and
Golnoosh Farnadi},
title = {PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning},
journal = {CoRR},
volume = {abs/2205.11584},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2205.11584},
doi = {10.48550/ARXIV.2205.11584},
eprinttype = {arXiv},
eprint = {2205.11584},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2205-11584.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-07332,
author = {Mayana Pereira and
Sikha Pentyala and
Anderson C. A. Nascimento and
Rafael T. de Sousa Jr. and
Martine De Cock},
title = {Secure Multiparty Computation for Synthetic Data Generation from Distributed
Data},
journal = {CoRR},
volume = {abs/2210.07332},
year = {2022},
url = {https://doi.org/10.48550/arXiv.2210.07332},
doi = {10.48550/ARXIV.2210.07332},
eprinttype = {arXiv},
eprint = {2210.07332},
timestamp = {Tue, 18 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2210-07332.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PentyalaRMDMNC22,
author = {Sikha Pentyala and
Davis Railsback and
Ricardo Maia and
Rafael Dowsley and
David Melanson and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Training Differentially Private Models with Secure Multiparty Computation},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {146},
year = {2022},
url = {https://eprint.iacr.org/2022/146},
timestamp = {Fri, 10 Nov 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/PentyalaRMDMNC22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlvesDSN21,
author = {Vin{\'{\i}}cius de Morais Alves and
Rafael Dowsley and
Rafael Tim{\'{o}}teo de Sousa Jr. and
Anderson C. A. Nascimento},
title = {Information-Theoretically Secure String Commitments Based on Packet
Reordering Channels},
journal = {{IEEE} Access},
volume = {9},
pages = {139928--139945},
year = {2021},
url = {https://doi.org/10.1109/ACCESS.2021.3118959},
doi = {10.1109/ACCESS.2021.3118959},
timestamp = {Wed, 03 Nov 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/AlvesDSN21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csr2/ZhangWBHHN21,
author = {Ruichao Zhang and
Shang Wang and
Ren{\'{e}}e Burton and
Minh Hoang and
Juhua Hu and
Anderson C. A. Nascimento},
title = {Clustering Analysis of Email Malware Campaigns},
booktitle = {{IEEE} International Conference on Cyber Security and Resilience,
{CSR} 2021, Rhodes, Greece, July 26-28, 2021},
pages = {95--102},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/CSR51186.2021.9527902},
doi = {10.1109/CSR51186.2021.9527902},
timestamp = {Thu, 23 Sep 2021 14:18:07 +0200},
biburl = {https://dblp.org/rec/conf/csr2/ZhangWBHHN21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/RibeiroSN21,
author = {Admilson de Ribamar Lima Ribeiro and
Reneilson Yves Carvalho Santos and
Anderson Clayton Alves Nascimento},
title = {Anomaly Detection Technique for Intrusion Detection in {SDN} Environment
using Continuous Data Stream Machine Learning Algorithms},
booktitle = {{IEEE} International Systems Conference, SysCon 2021, Vancouver, BC,
Canada, April 15 - May 15, 2021},
pages = {1--7},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/SysCon48628.2021.9447092},
doi = {10.1109/SYSCON48628.2021.9447092},
timestamp = {Fri, 11 Jun 2021 11:45:39 +0200},
biburl = {https://dblp.org/rec/conf/syscon/RibeiroSN21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-07365,
author = {Amanda Cristina Davi Resende and
Davis Railsback and
Rafael Dowsley and
Anderson C. A. Nascimento and
Diego F. Aranha},
title = {Fast Privacy-Preserving Text Classification based on Secure Multiparty
Computation},
journal = {CoRR},
volume = {abs/2101.07365},
year = {2021},
url = {https://arxiv.org/abs/2101.07365},
eprinttype = {arXiv},
eprint = {2101.07365},
timestamp = {Thu, 01 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2101-07365.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-11240,
author = {Rafael Dowsley and
Caleb Horst and
Anderson C. A. Nascimento},
title = {Round and Communication Balanced Protocols for Oblivious Evaluation
of Finite State Machines},
journal = {CoRR},
volume = {abs/2103.11240},
year = {2021},
url = {https://arxiv.org/abs/2103.11240},
eprinttype = {arXiv},
eprint = {2103.11240},
timestamp = {Wed, 24 Mar 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2103-11240.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-02769,
author = {Samuel Adams and
Chaitali Choudhary and
Martine De Cock and
Rafael Dowsley and
David Melanson and
Anderson C. A. Nascimento and
Davis Railsback and
Jianwei Shen},
title = {Privacy-Preserving Training of Tree Ensembles over Continuous Data},
journal = {CoRR},
volume = {abs/2106.02769},
year = {2021},
url = {https://arxiv.org/abs/2106.02769},
eprinttype = {arXiv},
eprint = {2106.02769},
timestamp = {Thu, 10 Jun 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-2106-02769.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ResendeRDNA21,
author = {Amanda Cristina Davi Resende and
Davis Railsback and
Rafael Dowsley and
Anderson C. A. Nascimento and
Diego F. Aranha},
title = {Fast Privacy-Preserving Text Classification based on Secure Multiparty
Computation},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {69},
year = {2021},
url = {https://eprint.iacr.org/2021/069},
timestamp = {Thu, 01 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/ResendeRDNA21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyHN21,
author = {Rafael Dowsley and
Caleb Horst and
Anderson C. A. Nascimento},
title = {Round and Communication Balanced Protocols for Oblivious Evaluation
of Finite State Machines},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {375},
year = {2021},
url = {https://eprint.iacr.org/2021/375},
timestamp = {Wed, 07 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyHN21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdamsCCDMNRS21,
author = {Samuel Adams and
Chaitali Choudhary and
Martine De Cock and
Rafael Dowsley and
David Melanson and
Anderson C. A. Nascimento and
Davis Railsback and
Jianwei Shen},
title = {Privacy-Preserving Training of Tree Ensembles over Continuous Data},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {754},
year = {2021},
url = {https://eprint.iacr.org/2021/754},
timestamp = {Wed, 07 Jul 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/AdamsCCDMNRS21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanSMN21,
author = {Sen Yuan and
Milan Shen and
Ilya Mironov and
Anderson C. A. Nascimento},
title = {Practical, Label Private Deep Learning Training based on Secure Multiparty
Computation and Differential Privacy},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {835},
year = {2021},
url = {https://eprint.iacr.org/2021/835},
timestamp = {Wed, 07 Jul 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/YuanSMN21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SivaguruPONC20,
author = {Raaghavi Sivaguru and
Jonathan Peck and
Femi G. Olumofin and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Inline Detection of {DGA} Domains Using Side Information},
journal = {{IEEE} Access},
volume = {8},
pages = {141910--141922},
year = {2020},
url = {https://doi.org/10.1109/ACCESS.2020.3013494},
doi = {10.1109/ACCESS.2020.3013494},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/SivaguruPONC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/DowsleyMN20,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {On the Composability of Statistically Secure Random Oblivious Transfer},
journal = {Entropy},
volume = {22},
number = {1},
pages = {107},
year = {2020},
url = {https://doi.org/10.3390/e22010107},
doi = {10.3390/E22010107},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/entropy/DowsleyMN20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmtm/NascimentoTASN20,
author = {Anderson C. A. Nascimento and
Eduardo Tavares and
Gabriel Alves de Albuquerque and
Erica Sousa and
Bruno Costa e Silva Nogueira},
title = {Performability evaluation of transport modes for cloud-based inbound
logistics: a study based on coffee industry},
journal = {Int. J. Manuf. Technol. Manag.},
volume = {34},
number = {2},
pages = {126--147},
year = {2020},
url = {https://doi.org/10.1504/IJMTM.2020.106209},
doi = {10.1504/IJMTM.2020.106209},
timestamp = {Thu, 04 Jun 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijmtm/NascimentoTASN20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CrepeauDN20,
author = {Claude Cr{\'{e}}peau and
Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Commitment Capacity of Unfair Noisy Channels},
journal = {{IEEE} Trans. Inf. Theory},
volume = {66},
number = {6},
pages = {3745--3752},
year = {2020},
url = {https://doi.org/10.1109/TIT.2020.2967048},
doi = {10.1109/TIT.2020.2967048},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/CrepeauDN20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-05377,
author = {Martine De Cock and
Rafael Dowsley and
Anderson C. A. Nascimento and
Davis Railsback and
Jianwei Shen and
Ariel Todoki},
title = {High Performance Logistic Regression for Privacy-Preserving Genome
Analysis},
journal = {CoRR},
volume = {abs/2002.05377},
year = {2020},
url = {https://arxiv.org/abs/2002.05377},
eprinttype = {arXiv},
eprint = {2002.05377},
timestamp = {Fri, 14 Feb 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2002-05377.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-05703,
author = {Raaghavi Sivaguru and
Jonathan Peck and
Femi G. Olumofin and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Inline Detection of {DGA} Domains Using Side Information},
journal = {CoRR},
volume = {abs/2003.05703},
year = {2020},
url = {https://arxiv.org/abs/2003.05703},
eprinttype = {arXiv},
eprint = {2003.05703},
timestamp = {Tue, 17 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/abs-2003-05703.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CockDNRST20,
author = {Martine De Cock and
Rafael Dowsley and
Anderson C. A. Nascimento and
Davis Railsback and
Jianwei Shen and
Ariel Todoki},
title = {High Performance Logistic Regression for Privacy-Preserving Genome
Analysis},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {171},
year = {2020},
url = {https://eprint.iacr.org/2020/171},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CockDNRST20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YuPGHCNC19,
author = {Bin Yu and
Jie Pan and
Daniel L. Gray and
Jiaming Hu and
Chhaya Choudhary and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Weakly Supervised Deep Learning for the Detection of Domain Generation
Algorithms},
journal = {{IEEE} Access},
volume = {7},
pages = {51542--51556},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2911522},
doi = {10.1109/ACCESS.2019.2911522},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/YuPGHCNC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PeckNSGOYNC19,
author = {Jonathan Peck and
Claire Nie and
Raaghavi Sivaguru and
Charles Grumer and
Femi G. Olumofin and
Bin Yu and
Anderson C. A. Nascimento and
Martine De Cock},
title = {CharBot: {A} Simple and Effective Method for Evading {DGA} Classifiers},
journal = {{IEEE} Access},
volume = {7},
pages = {91759--91771},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2927075},
doi = {10.1109/ACCESS.2019.2927075},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/PeckNSGOYNC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CockDHKNPT19,
author = {Martine De Cock and
Rafael Dowsley and
Caleb Horst and
Raj S. Katti and
Anderson C. A. Nascimento and
Wing{-}Sea Poon and
Stacey Truex},
title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines
and Logistic Regression Models Based on Pre-Computation},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {16},
number = {2},
pages = {217--230},
year = {2019},
url = {https://doi.org/10.1109/TDSC.2017.2679189},
doi = {10.1109/TDSC.2017.2679189},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tdsc/CockDHKNPT19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/YuGNH19,
author = {Bin Yu and
Giovanna Graciani and
Anderson C. A. Nascimento and
Juhua Hu},
editor = {Chaitanya K. Baru and
Jun Huan and
Latifur Khan and
Xiaohua Hu and
Ronay Ak and
Yuanyuan Tian and
Roger S. Barga and
Carlo Zaniolo and
Kisung Lee and
Yanfang (Fanny) Ye},
title = {Cost-adaptive Neural Networks for Peak Volume Prediction with {EMM}
Filtering},
booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
Los Angeles, CA, USA, December 9-12, 2019},
pages = {4208--4213},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/BigData47090.2019.9006188},
doi = {10.1109/BIGDATA47090.2019.9006188},
timestamp = {Tue, 18 Oct 2022 14:44:48 +0200},
biburl = {https://dblp.org/rec/conf/bigdataconf/YuGNH19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/GrumerPONC19,
author = {Charles Grumer and
Jonathan Peck and
Femi G. Olumofin and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Chaitanya K. Baru and
Jun Huan and
Latifur Khan and
Xiaohua Hu and
Ronay Ak and
Yuanyuan Tian and
Roger S. Barga and
Carlo Zaniolo and
Kisung Lee and
Yanfang (Fanny) Ye},
title = {Hardening {DGA} Classifiers Utilizing {IVAP}},
booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
Los Angeles, CA, USA, December 9-12, 2019},
pages = {6063--6065},
publisher = {{IEEE}},
year = {2019},
url = {https://doi.org/10.1109/BigData47090.2019.9006398},
doi = {10.1109/BIGDATA47090.2019.9006398},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bigdataconf/GrumerPONC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/RibeiroON19,
author = {Admilson de Ribamar Lima Ribeiro and
Edward David Moreno Ordonez and
Anderson Clayton Alves Nascimento},
editor = {Maria Ganzha and
Leszek A. Maciaszek and
Marcin Paprzycki},
title = {A Framework for Network Intrusion Detection using Network Programmability
and Data Stream Clustering Machine Learning Algorithms},
booktitle = {Preprints of Communication Papers of the 2019 Federated Conference
on Computer Science and Information Systems, FedCSIS 2019, Leipzig,
Germany, September 1-4, 2019},
series = {Annals of Computer Science and Information Systems},
volume = {20},
pages = {57--63},
year = {2019},
url = {https://doi.org/10.15439/2019F87},
doi = {10.15439/2019F87},
timestamp = {Tue, 23 Apr 2024 10:06:26 +0200},
biburl = {https://dblp.org/rec/conf/fedcsis/RibeiroON19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ReichTDCN19,
author = {Devin Reich and
Ariel Todoki and
Rafael Dowsley and
Martine De Cock and
Anderson C. A. Nascimento},
editor = {Hanna M. Wallach and
Hugo Larochelle and
Alina Beygelzimer and
Florence d'Alch{\'{e}}{-}Buc and
Emily B. Fox and
Roman Garnett},
title = {Privacy-Preserving Classification of Personal Text Messages with Secure
Multi-Party Computation},
booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference
on Neural Information Processing Systems 2019, NeurIPS 2019, December
8-14, 2019, Vancouver, BC, Canada},
pages = {3752--3764},
year = {2019},
url = {https://proceedings.neurips.cc/paper/2019/hash/a501bebf79d570651ff601788ea9d16d-Abstract.html},
timestamp = {Mon, 16 May 2022 15:41:51 +0200},
biburl = {https://dblp.org/rec/conf/nips/ReichTDCN19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01078,
author = {Jonathan Peck and
Claire Nie and
Raaghavi Sivaguru and
Charles Grumer and
Femi G. Olumofin and
Bin Yu and
Anderson C. A. Nascimento and
Martine De Cock},
title = {CharBot: {A} Simple and Effective Method for Evading {DGA} Classifiers},
journal = {CoRR},
volume = {abs/1905.01078},
year = {2019},
url = {http://arxiv.org/abs/1905.01078},
eprinttype = {arXiv},
eprint = {1905.01078},
timestamp = {Mon, 27 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1905-01078.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-10921,
author = {Claude Cr{\'{e}}peau and
Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Commitment Capacity of Unfair Noisy Channels},
journal = {CoRR},
volume = {abs/1905.10921},
year = {2019},
url = {http://arxiv.org/abs/1905.10921},
eprinttype = {arXiv},
eprint = {1905.10921},
timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1905-10921.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-02325,
author = {Martine De Cock and
Rafael Dowsley and
Anderson C. A. Nascimento and
Devin Reich and
Ariel Todoki},
title = {Privacy-Preserving Classification of Personal Text Messages with Secure
Multi-Party Computation: An Application to Hate-Speech Detection},
journal = {CoRR},
volume = {abs/1906.02325},
year = {2019},
url = {http://arxiv.org/abs/1906.02325},
eprinttype = {arXiv},
eprint = {1906.02325},
timestamp = {Thu, 13 Jun 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1906-02325.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-01586,
author = {Anisha Agarwal and
Rafael Dowsley and
Nicholas D. McKinney and
Dongrui Wu and
Chin{-}Teng Lin and
Martine De Cock and
Anderson C. A. Nascimento},
title = {Protecting Privacy of Users in Brain-Computer Interface Applications},
journal = {CoRR},
volume = {abs/1907.01586},
year = {2019},
url = {http://arxiv.org/abs/1907.01586},
eprinttype = {arXiv},
eprint = {1907.01586},
timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1907-01586.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CrepeauDN19,
author = {Claude Cr{\'{e}}peau and
Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Commitment Capacity of Unfair Noisy Channels},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {572},
year = {2019},
url = {https://eprint.iacr.org/2019/572},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CrepeauDN19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CockDNRT19,
author = {Martine De Cock and
Rafael Dowsley and
Anderson C. A. Nascimento and
Devin Reich and
Ariel Todoki},
title = {Privacy-Preserving Classification of Personal Text Messages with Secure
Multi-Party Computation: An Application to Hate-Speech Detection},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {744},
year = {2019},
url = {https://eprint.iacr.org/2019/744},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CockDNRT19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DowsleyLN18,
author = {Rafael Dowsley and
Felipe Lacerda and
Anderson C. A. Nascimento},
title = {Commitment and Oblivious Transfer in the Bounded Storage Model With
Errors},
journal = {{IEEE} Trans. Inf. Theory},
volume = {64},
number = {8},
pages = {5970--5984},
year = {2018},
url = {https://doi.org/10.1109/TIT.2018.2796128},
doi = {10.1109/TIT.2018.2796128},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/DowsleyLN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/FritchmanSDHCNT18,
author = {Kyle Fritchman and
Keerthanaa Saminathan and
Rafael Dowsley and
Tyler Hughes and
Martine De Cock and
Anderson C. A. Nascimento and
Ankur Teredesai},
editor = {Naoki Abe and
Huan Liu and
Calton Pu and
Xiaohua Hu and
Nesreen K. Ahmed and
Mu Qiao and
Yang Song and
Donald Kossmann and
Bing Liu and
Kisung Lee and
Jiliang Tang and
Jingrui He and
Jeffrey S. Saltz},
title = {Privacy-Preserving Scoring of Tree Ensembles: {A} Novel Framework
for {AI} in Healthcare},
booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
Seattle, WA, USA, December 10-13, 2018},
pages = {2413--2422},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/BigData.2018.8622627},
doi = {10.1109/BIGDATA.2018.8622627},
timestamp = {Fri, 19 Nov 2021 16:08:20 +0100},
biburl = {https://dblp.org/rec/conf/bigdataconf/FritchmanSDHCNT18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/SivaguruCYTNC18,
author = {Raaghavi Sivaguru and
Chhaya Choudhary and
Bin Yu and
Vadym Tymchenko and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Naoki Abe and
Huan Liu and
Calton Pu and
Xiaohua Hu and
Nesreen K. Ahmed and
Mu Qiao and
Yang Song and
Donald Kossmann and
Bing Liu and
Kisung Lee and
Jiliang Tang and
Jingrui He and
Jeffrey S. Saltz},
title = {An Evaluation of {DGA} Classifiers},
booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
Seattle, WA, USA, December 10-13, 2018},
pages = {5058--5067},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/BigData.2018.8621875},
doi = {10.1109/BIGDATA.2018.8621875},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bigdataconf/SivaguruCYTNC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/AgarwalDMWLCN18,
author = {Anisha Agarwal and
Rafael Dowsley and
Nicholas D. McKinney and
Dongrui Wu and
Chin{-}Teng Lin and
Martine De Cock and
Anderson C. A. Nascimento},
editor = {Naoki Abe and
Huan Liu and
Calton Pu and
Xiaohua Hu and
Nesreen K. Ahmed and
Mu Qiao and
Yang Song and
Donald Kossmann and
Bing Liu and
Kisung Lee and
Jiliang Tang and
Jingrui He and
Jeffrey S. Saltz},
title = {Privacy-Preserving Linear Regression for Brain-Computer Interface
Applications},
booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
Seattle, WA, USA, December 10-13, 2018},
pages = {5277--5278},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/BigData.2018.8621861},
doi = {10.1109/BIGDATA.2018.8621861},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bigdataconf/AgarwalDMWLCN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/BhagatSADCN18,
author = {Sanchya Bhagat and
Keerthanaa Saminathan and
Anisha Agarwal and
Rafael Dowsley and
Martine De Cock and
Anderson C. A. Nascimento},
editor = {Naoki Abe and
Huan Liu and
Calton Pu and
Xiaohua Hu and
Nesreen K. Ahmed and
Mu Qiao and
Yang Song and
Donald Kossmann and
Bing Liu and
Kisung Lee and
Jiliang Tang and
Jingrui He and
Jeffrey S. Saltz},
title = {Privacy-Preserving User Profiling with Facebook Likes},
booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
Seattle, WA, USA, December 10-13, 2018},
pages = {5298--5299},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/BigData.2018.8622081},
doi = {10.1109/BIGDATA.2018.8622081},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bigdataconf/BhagatSADCN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evalita/AhluwaliaSCNC18,
author = {Resham Ahluwalia and
Himani Soni and
Edward Callow and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Tommaso Caselli and
Nicole Novielli and
Viviana Patti and
Paolo Rosso},
title = {Detecting Hate Speech Against Women in English Tweets},
booktitle = {Proceedings of the Sixth Evaluation Campaign of Natural Language Processing
and Speech Tools for Italian. Final Workshop {(EVALITA} 2018) co-located
with the Fifth Italian Conference on Computational Linguistics (CLiC-it
2018), Turin, Italy, December 12-13, 2018},
series = {{CEUR} Workshop Proceedings},
volume = {2263},
publisher = {CEUR-WS.org},
year = {2018},
url = {https://ceur-ws.org/Vol-2263/paper032.pdf},
timestamp = {Fri, 10 Mar 2023 16:23:20 +0100},
biburl = {https://dblp.org/rec/conf/evalita/AhluwaliaSCNC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/YuPHNC18,
author = {Bin Yu and
Jie Pan and
Jiaming Hu and
Anderson C. A. Nascimento and
Martine De Cock},
title = {Character Level based Detection of {DGA} Domain Names},
booktitle = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018,
Rio de Janeiro, Brazil, July 8-13, 2018},
pages = {1--8},
publisher = {{IEEE}},
year = {2018},
url = {https://doi.org/10.1109/IJCNN.2018.8489147},
doi = {10.1109/IJCNN.2018.8489147},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ijcnn/YuPHNC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PereiraCYCN18,
author = {Mayana Pereira and
Shaun Coleman and
Bin Yu and
Martine De Cock and
Anderson C. A. Nascimento},
editor = {Michael D. Bailey and
Thorsten Holz and
Manolis Stamatogiannakis and
Sotiris Ioannidis},
title = {Dictionary Extraction and Detection of Algorithmically Generated Domain
Names in Passive {DNS} Traffic},
booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International
Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
2018, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {11050},
pages = {295--314},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-00470-5\_14},
doi = {10.1007/978-3-030-00470-5\_14},
timestamp = {Mon, 20 Nov 2023 09:00:29 +0100},
biburl = {https://dblp.org/rec/conf/raid/PereiraCYCN18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sepln/AhluwaliaSCNC18,
author = {Resham Ahluwalia and
Evgeniia Shcherbinina and
Edward Callow and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Paolo Rosso and
Julio Gonzalo and
Raquel Mart{\'{\i}}nez and
Soto Montalvo and
Jorge Carrillo de Albornoz},
title = {Detecting Misogynous Tweets},
booktitle = {Proceedings of the Third Workshop on Evaluation of Human Language
Technologies for Iberian Languages (IberEval 2018) co-located with
34th Conference of the Spanish Society for Natural Language Processing
{(SEPLN} 2018), Sevilla, Spain, September 18th, 2018},
series = {{CEUR} Workshop Proceedings},
volume = {2150},
pages = {242--248},
publisher = {CEUR-WS.org},
year = {2018},
url = {https://ceur-ws.org/Vol-2150/AMI\_paper3.pdf},
timestamp = {Fri, 10 Mar 2023 16:22:59 +0100},
biburl = {https://dblp.org/rec/conf/sepln/AhluwaliaSCNC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/ChoudharySPYNC18,
author = {Chhaya Choudhary and
Raaghavi Sivaguru and
Mayana Pereira and
Bin Yu and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Sabu M. Thampi and
Sanjay Madria and
Guojun Wang and
Danda B. Rawat and
Jos{\'{e}} M. Alcaraz Calero},
title = {Algorithmically Generated Domain Detection and Malware Family Classification},
booktitle = {Security in Computing and Communications - 6th International Symposium,
{SSCC} 2018, Bangalore, India, September 19-22, 2018, Revised Selected
Papers},
series = {Communications in Computer and Information Science},
volume = {969},
pages = {640--655},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-981-13-5826-5\_50},
doi = {10.1007/978-981-13-5826-5\_50},
timestamp = {Wed, 24 Apr 2024 14:55:54 +0200},
biburl = {https://dblp.org/rec/conf/sscc/ChoudharySPYNC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-10145,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {On the Composability of Statistically Secure Random Oblivious Transfer},
journal = {CoRR},
volume = {abs/1808.10145},
year = {2018},
url = {http://arxiv.org/abs/1808.10145},
eprinttype = {arXiv},
eprint = {1808.10145},
timestamp = {Mon, 03 Sep 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1808-10145.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-10151,
author = {Sisi Wang and
Wing{-}Sea Poon and
Golnoosh Farnadi and
Caleb Horst and
Kebra Thompson and
Michael Nickels and
Rafael Dowsley and
Anderson C. A. Nascimento and
Martine De Cock},
title = {VirtualIdentity: Privacy-Preserving User Profiling},
journal = {CoRR},
volume = {abs/1808.10151},
year = {2018},
url = {http://arxiv.org/abs/1808.10151},
eprinttype = {arXiv},
eprint = {1808.10151},
timestamp = {Mon, 03 Sep 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1808-10151.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SouzaGLPN17,
author = {S. M. P. C. Souza and
R. F. Gon{\c{c}}alves and
E. Leonova and
R. S. Puttini and
Anderson C. A. Nascimento},
title = {Privacy-ensuring electronic health records in the cloud},
journal = {Concurr. Comput. Pract. Exp.},
volume = {29},
number = {11},
year = {2017},
url = {https://doi.org/10.1002/cpe.4045},
doi = {10.1002/CPE.4045},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/concurrency/SouzaGLPN17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DowsleyN17,
author = {Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels
Against Malicious Adversaries: The Case of Low Erasure Probability},
journal = {{IEEE} Trans. Inf. Theory},
volume = {63},
number = {10},
pages = {6819--6826},
year = {2017},
url = {https://doi.org/10.1109/TIT.2017.2735423},
doi = {10.1109/TIT.2017.2735423},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/DowsleyN17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/YuGPCN17,
author = {Bin Yu and
Daniel L. Gray and
Jie Pan and
Martine De Cock and
Anderson C. A. Nascimento},
editor = {Raju Gottumukkala and
Xia Ning and
Guozhu Dong and
Vijay Raghavan and
Srinivas Aluru and
George Karypis and
Lucio Miele and
Xindong Wu},
title = {Inline {DGA} Detection with Deep Networks},
booktitle = {2017 {IEEE} International Conference on Data Mining Workshops, {ICDM}
Workshops 2017, New Orleans, LA, USA, November 18-21, 2017},
pages = {683--692},
publisher = {{IEEE} Computer Society},
year = {2017},
url = {https://doi.org/10.1109/ICDMW.2017.96},
doi = {10.1109/ICDMW.2017.96},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icdm/YuGPCN17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-08256,
author = {Paulo S. L. M. Barreto and
Bernardo David and
Rafael Dowsley and
Kirill Morozov and
Anderson C. A. Nascimento},
title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer
in the {ROM}},
journal = {CoRR},
volume = {abs/1710.08256},
year = {2017},
url = {http://arxiv.org/abs/1710.08256},
eprinttype = {arXiv},
eprint = {1710.08256},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1710-08256.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoDDMN17,
author = {Paulo S. L. M. Barreto and
Bernardo David and
Rafael Dowsley and
Kirill Morozov and
Anderson C. A. Nascimento},
title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer
in the {ROM}},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {993},
year = {2017},
url = {http://eprint.iacr.org/2017/993},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/BarretoDDMN17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/GondimANGK16,
author = {Jo{\~{a}}o Jos{\'{e}} Costa Gondim and
Robson de Oliveira Albuquerque and
Anderson Clayton Alves Nascimento and
Luis Javier Garc{\'{\i}}a{-}Villalba and
Tai{-}Hoon Kim},
title = {A Methodological Approach for Assessing Amplified Reflection Distributed
Denial of Service on the Internet of Things},
journal = {Sensors},
volume = {16},
number = {11},
pages = {1855},
year = {2016},
url = {https://doi.org/10.3390/s16111855},
doi = {10.3390/S16111855},
timestamp = {Mon, 03 Jan 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/sensors/GondimANGK16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DavidDGMNP16,
author = {Bernardo Machado David and
Rafael Dowsley and
Jeroen van de Graaf and
Davidson Marques and
Anderson C. A. Nascimento and
Adriana C. B. Pinto},
title = {Unconditionally Secure, Universally Composable Privacy Preserving
Linear Algebra},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {11},
number = {1},
pages = {59--73},
year = {2016},
url = {https://doi.org/10.1109/TIFS.2015.2476783},
doi = {10.1109/TIFS.2015.2476783},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tifs/DavidDGMNP16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/WangPFHTNNC16,
author = {Sisi Wang and
Wing{-}Sea Poon and
Golnoosh Farnadi and
Caleb Horst and
Kebra Thompson and
Michael Nickels and
Anderson C. A. Nascimento and
Martine De Cock},
editor = {Ravi Kumar and
James Caverlee and
Hanghang Tong},
title = {VirtualIdentity: Privacy preserving user profiling},
booktitle = {2016 {IEEE/ACM} International Conference on Advances in Social Networks
Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August
18-21, 2016},
pages = {1434--1437},
publisher = {{IEEE} Computer Society},
year = {2016},
url = {https://doi.org/10.1109/ASONAM.2016.7752438},
doi = {10.1109/ASONAM.2016.7752438},
timestamp = {Sun, 06 Oct 2024 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/asunam/WangPFHTNNC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2016,
editor = {Anderson C. A. Nascimento and
Paulo S. L. M. Barreto},
title = {Information Theoretic Security - 9th International Conference, {ICITS}
2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {10015},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-49175-2},
doi = {10.1007/978-3-319-49175-2},
isbn = {978-3-319-49174-5},
timestamp = {Tue, 14 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icits/2016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2016,
editor = {Matt Bishop and
Anderson C. A. Nascimento},
title = {Information Security - 19th International Conference, {ISC} 2016,
Honolulu, HI, USA, September 3-6, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9866},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-45871-7},
doi = {10.1007/978-3-319-45871-7},
isbn = {978-3-319-45870-0},
timestamp = {Tue, 14 May 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isw/2016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CockDHKNNP16,
author = {Martine De Cock and
Rafael Dowsley and
Caleb Horst and
Raj S. Katti and
Anderson C. A. Nascimento and
Stacey C. Newman and
Wing{-}Sea Poon},
title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines
and Logistic Regression Models based on Pre-Computation},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {736},
year = {2016},
url = {http://eprint.iacr.org/2016/736},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CockDHKNNP16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/PereiraDNH15,
author = {Mayana Pereira and
Rafael Dowsley and
Anderson C. A. Nascimento and
Goichiro Hanaoka},
title = {Public-Key Encryption Schemes with Bounded {CCA} Security and Optimal
Ciphertext Length Based on the {CDH} and {HDH} Assumptions},
journal = {Comput. J.},
volume = {58},
number = {10},
pages = {2738--2746},
year = {2015},
url = {https://doi.org/10.1093/comjnl/bxv040},
doi = {10.1093/COMJNL/BXV040},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/cj/PereiraDNH15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TonicelliNDMIHO15,
author = {Rafael Tonicelli and
Anderson C. A. Nascimento and
Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Hideki Imai and
Goichiro Hanaoka and
Akira Otsuka},
title = {Information-theoretically secure oblivious polynomial evaluation in
the commodity-based model},
journal = {Int. J. Inf. Sec.},
volume = {14},
number = {1},
pages = {73--84},
year = {2015},
url = {https://doi.org/10.1007/s10207-014-0247-8},
doi = {10.1007/S10207-014-0247-8},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CockDNN15,
author = {Martine De Cock and
Rafael Dowsley and
Anderson C. A. Nascimento and
Stacey C. Newman},
editor = {Indrajit Ray and
Xiaofeng Wang and
Kui Ren and
Christos Dimitrakakis and
Aikaterini Mitrokotsa and
Arunesh Sinha},
title = {Fast, Privacy Preserving Linear Regression over Distributed Datasets
based on Pre-Distributed Data},
booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and
Security, AISec 2015, Denver, Colorado, USA, October 16, 2015},
pages = {3--14},
publisher = {{ACM}},
year = {2015},
url = {https://doi.org/10.1145/2808769.2808774},
doi = {10.1145/2808769.2808774},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/CockDNN15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DavidDKN15,
author = {Bernardo Machado David and
Rafael Dowsley and
Raj S. Katti and
Anderson C. A. Nascimento},
editor = {Man Ho Au and
Atsuko Miyaji},
title = {Efficient Unconditionally Secure Comparison and Privacy Preserving
Machine Learning Classification Protocols},
booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
Japan, November 24-26, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {9451},
pages = {354--367},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-26059-4\_20},
doi = {10.1007/978-3-319-26059-4\_20},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/provsec/DavidDKN15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/GoncalvesTNSLA15,
author = {Rosiberto Dos Santos Gon{\c{c}}alves and
Eduardo Antonio Guimar{\~{a}}es Tavares and
Anderson C. A. Nascimento and
Erica Sousa and
Fernando Ant{\^{o}}nio Aires Lins and
Gabriel Alves},
title = {Performability Assessment of a Government Process in the Cloud},
booktitle = {2015 {IEEE} International Conference on Systems, Man, and Cybernetics,
Kowloon Tong, Hong Kong, October 9-12, 2015},
pages = {87--92},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/SMC.2015.28},
doi = {10.1109/SMC.2015.28},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/smc/GoncalvesTNSLA15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DowsleyLN15,
author = {Rafael Dowsley and
Felipe Lacerda and
Anderson C. A. Nascimento},
title = {Commitment and Oblivious Transfer in the Bounded Storage Model with
Errors},
journal = {CoRR},
volume = {abs/1510.06623},
year = {2015},
url = {http://arxiv.org/abs/1510.06623},
eprinttype = {arXiv},
eprint = {1510.06623},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/DowsleyLN15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyLN15,
author = {Rafael Dowsley and
Felipe Lacerda and
Anderson C. A. Nascimento},
title = {Commitment and Oblivious Transfer in the Bounded Storage Model with
Errors},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {952},
year = {2015},
url = {http://eprint.iacr.org/2015/952},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyLN15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DavidDN14,
author = {Bernardo David and
Rafael Dowsley and
Anderson C. A. Nascimento},
editor = {Dimitris Gritzalis and
Aggelos Kiayias and
Ioannis G. Askoxylakis},
title = {Universally Composable Oblivious Transfer Based on a Variant of {LPN}},
booktitle = {Cryptology and Network Security - 13th International Conference, {CANS}
2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {8813},
pages = {143--158},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-319-12280-9\_10},
doi = {10.1007/978-3-319-12280-9\_10},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/cans/DavidDN14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/KhotHNKTA14,
author = {Amruta Khot and
Abdeltawab M. Hendawi and
Anderson C. A. Nascimento and
Raj S. Katti and
Ankur Teredesai and
Mohamed H. Ali},
editor = {Chengyang Zhang and
Anas Basalamah and
Abdeltawab M. Hendawi and
Phuc Nguyen},
title = {Road network compression techniques in spatiotemporal embedded systems:
a survey},
booktitle = {Proceedings of the 5th {ACM} {SIGSPATIAL} International Workshop on
GeoStreaming, {IWGS} '14, Dallas, Texas, USA, November 4, 2014},
pages = {33--36},
publisher = {{ACM}},
year = {2014},
url = {https://doi.org/10.1145/2676552.2676645},
doi = {10.1145/2676552.2676645},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/gis/KhotHNKTA14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DowsleyLN14,
author = {Rafael Dowsley and
Felipe Lacerda and
Anderson C. A. Nascimento},
title = {Oblivious transfer in the bounded storage model with errors},
booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu,
HI, USA, June 29 - July 4, 2014},
pages = {1623--1627},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/ISIT.2014.6875108},
doi = {10.1109/ISIT.2014.6875108},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isit/DowsleyLN14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smc/NascimentoASNT14,
author = {Anderson C. A. Nascimento and
Gabriel Alves and
Erica Sousa and
Bruno Costa e Silva Nogueira and
Eduardo Antonio Guimar{\~{a}}es Tavares},
title = {Transport mode assessment for inbound logistics: {A} study based on
coffee industry},
booktitle = {2014 {IEEE} International Conference on Systems, Man, and Cybernetics,
{SMC} 2014, San Diego, CA, USA, October 5-8, 2014},
pages = {1318--1323},
publisher = {{IEEE}},
year = {2014},
url = {https://doi.org/10.1109/SMC.2014.6974097},
doi = {10.1109/SMC.2014.6974097},
timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/smc/NascimentoASNT14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DowsleyN14,
author = {Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels
against Malicious Adversaries},
journal = {CoRR},
volume = {abs/1410.2862},
year = {2014},
url = {http://arxiv.org/abs/1410.2862},
eprinttype = {arXiv},
eprint = {1410.2862},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/DowsleyN14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyN14,
author = {Rafael Dowsley and
Anderson C. A. Nascimento},
title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels
against Malicious Adversaries},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {823},
year = {2014},
url = {http://eprint.iacr.org/2014/823},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyN14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DowsleyGMN12,
author = {Rafael Dowsley and
Jeroen van de Graaf and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {Oblivious Transfer Based on the McEliece Assumptions},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {95-A},
number = {2},
pages = {567--575},
year = {2012},
url = {https://doi.org/10.1587/transfun.E95.A.567},
doi = {10.1587/TRANSFUN.E95.A.567},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/DowsleyGMN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DavidNS12,
author = {Bernardo Machado David and
Anderson C. A. Nascimento and
Rafael T. de Sousa Jr.},
title = {Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {95-A},
number = {11},
pages = {2059--2066},
year = {2012},
url = {https://doi.org/10.1587/transfun.E95.A.2059},
doi = {10.1587/TRANSFUN.E95.A.2059},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/DavidNS12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/DottlingDMN12,
author = {Nico D{\"{o}}ttling and
Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {A {CCA2} Secure Variant of the McEliece Cryptosystem},
journal = {{IEEE} Trans. Inf. Theory},
volume = {58},
number = {10},
pages = {6672--6680},
year = {2012},
url = {https://doi.org/10.1109/TIT.2012.2203582},
doi = {10.1109/TIT.2012.2203582},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/DottlingDMN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DottlingMN12,
author = {Nico D{\"{o}}ttling and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
editor = {Xiaoyun Wang and
Kazue Sako},
title = {{IND-CCA} Secure Cryptography Based on a Variant of the {LPN} Problem},
booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
on the Theory and Application of Cryptology and Information Security,
Beijing, China, December 2-6, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7658},
pages = {485--503},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-34961-4\_30},
doi = {10.1007/978-3-642-34961-4\_30},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingMN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icce-berlin/MelgarZMN12,
author = {Max E. Vizcarra Melgar and
Alexandre Zaghetto and
Bruno Macchiavello and
Anderson C. A. Nascimento},
title = {{CQR} codes: Colored quick-response codes},
booktitle = {{IEEE} Second International Conference on Consumer Electronics - Berlin,
ICCE-Berlin 2012, Berlin, Germany, September 3-5, 2012},
pages = {321--325},
publisher = {{IEEE}},
year = {2012},
url = {https://doi.org/10.1109/ICCE-Berlin.2012.6336526},
doi = {10.1109/ICCE-BERLIN.2012.6336526},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icce-berlin/MelgarZMN12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DavidNM12,
author = {Bernardo Machado David and
Anderson C. A. Nascimento and
J{\"{o}}rn M{\"{u}}ller{-}Quade},
editor = {Adam D. Smith},
title = {Universally Composable Oblivious Transfer from Lossy Encryption and
the McEliece Assumptions},
booktitle = {Information Theoretic Security - 6th International Conference, {ICITS}
2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {7412},
pages = {80--99},
publisher = {Springer},
year = {2012},
url = {https://doi.org/10.1007/978-3-642-32284-6\_5},
doi = {10.1007/978-3-642-32284-6\_5},
timestamp = {Tue, 20 Aug 2024 08:48:08 +0200},
biburl = {https://dblp.org/rec/conf/icits/DavidNM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-5224,
author = {Nico D{\"{o}}ttling and
Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {A {CCA2} Secure Variant of the McEliece Cryptosystem},
journal = {CoRR},
volume = {abs/1205.5224},
year = {2012},
url = {http://arxiv.org/abs/1205.5224},
eprinttype = {arXiv},
eprint = {1205.5224},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1205-5224.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DowsleyMOHIN11,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Akira Otsuka and
Goichiro Hanaoka and
Hideki Imai and
Anderson C. A. Nascimento},
title = {Universally Composable and Statistically Secure Verifiable Secret
Sharing Scheme Based on Pre-Distributed Data},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {94-A},
number = {2},
pages = {725--734},
year = {2011},
url = {https://doi.org/10.1587/transfun.E94.A.725},
doi = {10.1587/TRANSFUN.E94.A.725},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/DowsleyMOHIN11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/CarrijoTN11,
author = {Jos{\'{e}} Carrijo and
Rafael Tonicelli and
Anderson C. A. Nascimento},
title = {A Fault Analytic Method against HB\({}^{\mbox{+}}\)},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {94-A},
number = {2},
pages = {855--859},
year = {2011},
url = {https://doi.org/10.1587/transfun.E94.A.855},
doi = {10.1587/TRANSFUN.E94.A.855},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/CarrijoTN11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PintoDMN11,
author = {Adriana C. B. Pinto and
Rafael Dowsley and
Kirill Morozov and
Anderson C. A. Nascimento},
title = {Achieving Oblivious Transfer Capacity of Generalized Erasure Channels
in the Malicious Model},
journal = {{IEEE} Trans. Inf. Theory},
volume = {57},
number = {8},
pages = {5566--5571},
year = {2011},
url = {https://doi.org/10.1109/TIT.2011.2158898},
doi = {10.1109/TIT.2011.2158898},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/PintoDMN11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/DavidN11,
author = {Bernardo Machado David and
Anderson C. A. Nascimento},
title = {Efficient fully simulatable oblivious transfer from the McEliece assumptions},
booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
October 16-20, 2011},
pages = {638--642},
publisher = {{IEEE}},
year = {2011},
url = {https://doi.org/10.1109/ITW.2011.6089575},
doi = {10.1109/ITW.2011.6089575},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/itw/DavidN11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNT11,
author = {Bernardo Machado David and
Anderson C. A. Nascimento and
Rafael Tonicelli},
title = {A Framework for Secure Single Sign-On},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {246},
year = {2011},
url = {http://eprint.iacr.org/2011/246},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DavidNT11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/PereiraDHN10,
author = {Mayana Pereira and
Rafael Dowsley and
Goichiro Hanaoka and
Anderson C. A. Nascimento},
editor = {Mike Burmester and
Gene Tsudik and
Spyros S. Magliveras and
Ivana Ilic},
title = {Public Key Encryption Schemes with Bounded {CCA} Security and Optimal
Ciphertext Length Based on the {CDH} Assumption},
booktitle = {Information Security - 13th International Conference, {ISC} 2010,
Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6531},
pages = {299--306},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-18178-8\_26},
doi = {10.1007/978-3-642-18178-8\_26},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isw/PereiraDHN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyHIN10,
author = {Rafael Dowsley and
Goichiro Hanaoka and
Hideki Imai and
Anderson C. A. Nascimento},
editor = {Yongwha Chung and
Moti Yung},
title = {Round-Optimal Deniable Ring Authentication in the Presence of Big
Brother},
booktitle = {Information Security Applications - 11th International Workshop, {WISA}
2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6513},
pages = {307--321},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-17955-6\_23},
doi = {10.1007/978-3-642-17955-6\_23},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyGMN10,
author = {Rafael Dowsley and
Jeroen van de Graaf and
Davidson Marques and
Anderson C. A. Nascimento},
editor = {Yongwha Chung and
Moti Yung},
title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner
Product},
booktitle = {Information Security Applications - 11th International Workshop, {WISA}
2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {6513},
pages = {337--350},
publisher = {Springer},
year = {2010},
url = {https://doi.org/10.1007/978-3-642-17955-6\_25},
doi = {10.1007/978-3-642-17955-6\_25},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-0756,
author = {Jos{\'{e}} Carrijo and
Rafael Tonicelli and
Anderson C. A. Nascimento},
title = {A Fault Analytic Method against {HB+}},
journal = {CoRR},
volume = {abs/1010.0756},
year = {2010},
url = {http://arxiv.org/abs/1010.0756},
eprinttype = {arXiv},
eprint = {1010.0756},
timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/corr/abs-1010-0756.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN10,
author = {Rafael Dowsley and
Jeroen van de Graaf and
Davidson Marques and
Anderson C. A. Nascimento},
title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner
Product},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {289},
year = {2010},
url = {http://eprint.iacr.org/2010/289},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrijoTN10,
author = {Jos{\'{e}} Carrijo and
Rafael Tonicelli and
Anderson C. A. Nascimento},
title = {A Fault Analytic Method against {HB+}},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {508},
year = {2010},
url = {http://eprint.iacr.org/2010/508},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CarrijoTN10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/CarrijoTIN09,
author = {Jos{\'{e}} Carrijo and
Rafael Tonicelli and
Hideki Imai and
Anderson C. A. Nascimento},
title = {A Novel Probabilistic Passive Attack on the Protocols {HB} and HB\({}^{\mbox{+}}\)},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {92-A},
number = {2},
pages = {658--662},
year = {2009},
url = {https://doi.org/10.1587/transfun.E92.A.658},
doi = {10.1587/TRANSFUN.E92.A.658},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/CarrijoTIN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DowsleyMN09,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
editor = {Marc Fischlin},
title = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece
Assumptions in the Standard Model},
booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5473},
pages = {240--251},
publisher = {Springer},
year = {2009},
url = {https://doi.org/10.1007/978-3-642-00862-7\_16},
doi = {10.1007/978-3-642-00862-7\_16},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ctrsa/DowsleyMN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TonicelliDHIMON09,
author = {Rafael Tonicelli and
Rafael Dowsley and
Goichiro Hanaoka and
Hideki Imai and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Akira Otsuka and
Anderson C. A. Nascimento},
title = {Information-Theoretically Secure Oblivious Polynomial Evaluation in
the Commodity-Based Model},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {270},
year = {2009},
url = {http://eprint.iacr.org/2009/270},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/TonicelliDHIMON09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyHIN09,
author = {Rafael Dowsley and
Goichiro Hanaoka and
Hideki Imai and
Anderson C. A. Nascimento},
title = {Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {271},
year = {2009},
url = {http://eprint.iacr.org/2009/271},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyHIN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyMOHIN09,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Akira Otsuka and
Goichiro Hanaoka and
Hideki Imai and
Anderson C. A. Nascimento},
title = {Universally Composable and Statistically Secure Verifiable Secret
Sharing Scheme Based on Pre-Distributed Data},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {273},
year = {2009},
url = {http://eprint.iacr.org/2009/273},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyMOHIN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PintoDMN09,
author = {Adriana C. B. Pinto and
Rafael Dowsley and
Kirill Morozov and
Anderson C. A. Nascimento},
title = {Achieving Oblivious Transfer Capacity of Generalized Erasure Channels
in the Malicious Model},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {570},
year = {2009},
url = {http://eprint.iacr.org/2009/570},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/PintoDMN09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NascimentoW08,
author = {Anderson C. A. Nascimento and
Andreas J. Winter},
title = {On the Oblivious-Transfer Capacity of Noisy Resources},
journal = {{IEEE} Trans. Inf. Theory},
volume = {54},
number = {6},
pages = {2572--2581},
year = {2008},
url = {https://doi.org/10.1109/TIT.2008.921856},
doi = {10.1109/TIT.2008.921856},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/NascimentoW08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NascimentoBSI08,
author = {Anderson C. A. Nascimento and
Jo{\~{a}}o Barros and
Stefan Skludarek and
Hideki Imai},
title = {The Commitment Capacity of the Gaussian Channel Is Infinite},
journal = {{IEEE} Trans. Inf. Theory},
volume = {54},
number = {6},
pages = {2785--2789},
year = {2008},
url = {https://doi.org/10.1109/TIT.2008.921686},
doi = {10.1109/TIT.2008.921686},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tit/NascimentoBSI08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DowsleyGMN08,
author = {Rafael Dowsley and
Jeroen van de Graaf and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
editor = {Reihaneh Safavi{-}Naini},
title = {Oblivious Transfer Based on the McEliece Assumptions},
booktitle = {Information Theoretic Security, Third International Conference, {ICITS}
2008, Calgary, Canada, August 10-13, 2008, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {5155},
pages = {107--117},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-85093-9\_11},
doi = {10.1007/978-3-540-85093-9\_11},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN08,
author = {Rafael Dowsley and
Jeroen van de Graaf and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {Oblivious Transfer based on the McEliece Assumptions\}},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {138},
year = {2008},
url = {http://eprint.iacr.org/2008/138},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrijoTIN08,
author = {Jos{\'{e}} Carrijo and
Rafael Tonicelli and
Hideki Imai and
Anderson C. A. Nascimento},
title = {A Novel Probabilistic Passive Attack on the Protocols {HB} and {HB+}},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {231},
year = {2008},
url = {http://eprint.iacr.org/2008/231},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/CarrijoTIN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyGMN08a,
author = {Rafael Dowsley and
Jeroen van de Graaf and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {On the Composability of Statistically Secure Bit Commitments},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {457},
year = {2008},
url = {http://eprint.iacr.org/2008/457},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08a.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DowsleyMN08,
author = {Rafael Dowsley and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento},
title = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece
Assumptions in the Standard Model},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {468},
year = {2008},
url = {http://eprint.iacr.org/2008/468},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/DowsleyMN08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ImaiMN07,
author = {Hideki Imai and
Kirill Morozov and
Anderson C. A. Nascimento},
editor = {Yvo Desmedt},
title = {Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from
Any Non-trivial Noisy Correlation},
booktitle = {Information Theoretic Security - Second International Conference,
{ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {4883},
pages = {183--194},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-642-10230-1\_16},
doi = {10.1007/978-3-642-10230-1\_16},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icits/ImaiMN07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apnoms/CrispimPNAS06,
author = {Hon{\'{o}}rio Assis Filho Crispim and
Eduardo T. L. Pastor and
Anderson C. A. Nascimento and
Humberto Abdalla Jr. and
Antonio Jos{\'{e}} Martins Soares},
editor = {Young{-}Tak Kim and
Makoto Takano},
title = {{IP/WDM} Optical Network Testbed: Design and Implementation},
booktitle = {Management of Convergence Networks and Services, 9th Asia-Pacific
Network Operations and Management Symposium, {APNOMS} 2006 Busan,
Korea, September 27-29, 2006, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4238},
pages = {441--450},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11876601\_45},
doi = {10.1007/11876601\_45},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/apnoms/CrispimPNAS06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ImaiMN06,
author = {Hideki Imai and
Kirill Morozov and
Anderson C. A. Nascimento},
title = {On the Oblivious Transfer Capacity of the Erasure Channel},
booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
{ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
2006},
pages = {1428--1431},
publisher = {{IEEE}},
year = {2006},
url = {https://doi.org/10.1109/ISIT.2006.262082},
doi = {10.1109/ISIT.2006.262082},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isit/ImaiMN06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ImaiMNW06,
author = {Hideki Imai and
Kirill Morozov and
Anderson C. A. Nascimento and
Andreas J. Winter},
title = {Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations},
booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
{ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
2006},
pages = {1432--1436},
publisher = {{IEEE}},
year = {2006},
url = {https://doi.org/10.1109/ISIT.2006.262083},
doi = {10.1109/ISIT.2006.262083},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isit/ImaiMNW06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/BarrosINS06,
author = {Jo{\~{a}}o Barros and
Hideki Imai and
Anderson C. A. Nascimento and
Stefan Skludarek},
title = {Bit Commitment over Gaussian Channels},
booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
{ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
2006},
pages = {1437--1441},
publisher = {{IEEE}},
year = {2006},
url = {https://doi.org/10.1109/ISIT.2006.262084},
doi = {10.1109/ISIT.2006.262084},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isit/BarrosINS06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Nascimento006,
author = {Anderson C. A. Nascimento and
Andreas J. Winter},
title = {On the Oblivious Transfer Capacity of Noisy Correlations},
booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory,
{ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14,
2006},
pages = {1871--1875},
publisher = {{IEEE}},
year = {2006},
url = {https://doi.org/10.1109/ISIT.2006.261805},
doi = {10.1109/ISIT.2006.261805},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isit/Nascimento006.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/ImaiMNTW05,
author = {Hideki Imai and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento and
Pim Tuyls and
Andreas J. Winter},
title = {An information theoretical model for quantum secret sharing},
journal = {Quantum Inf. Comput.},
volume = {5},
number = {1},
pages = {69--80},
year = {2005},
url = {https://doi.org/10.26421/QIC5.1-7},
doi = {10.26421/QIC5.1-7},
timestamp = {Fri, 30 Apr 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/qic/ImaiMNTW05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YamamotoCNSU05,
author = {Go Yamamoto and
Koji Chida and
Anderson C. A. Nascimento and
Koutarou Suzuki and
Shigenori Uchiyama},
editor = {JooSeok Song and
Taekyoung Kwon and
Moti Yung},
title = {Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal
Encryption},
booktitle = {Information Security Applications, 6th International Workshop, {WISA}
2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {3786},
pages = {328--342},
publisher = {Springer},
year = {2005},
url = {https://doi.org/10.1007/11604938\_26},
doi = {10.1007/11604938\_26},
timestamp = {Tue, 14 May 2019 10:00:35 +0200},
biburl = {https://dblp.org/rec/conf/wisa/YamamotoCNSU05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaIMNOW04,
author = {Goichiro Hanaoka and
Hideki Imai and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento and
Akira Otsuka and
Andreas J. Winter},
editor = {Huaxiong Wang and
Josef Pieprzyk and
Vijay Varadharajan},
title = {Information Theoretically Secure Oblivious Polynomial Evaluation:
Model, Bounds, and Constructions},
booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
2004, Sydney, Australia, July 13-15, 2004. Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3108},
pages = {62--73},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/978-3-540-27800-9\_6},
doi = {10.1007/978-3-540-27800-9\_6},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NascimentoMOHI04,
author = {Anderson C. A. Nascimento and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Akira Otsuka and
Goichiro Hanaoka and
Hideki Imai},
editor = {Markus Jakobsson and
Moti Yung and
Jianying Zhou},
title = {Unconditionally Non-interactive Verifiable Secret Sharing Secure against
Faulty Majorities in the Commodity Based Model},
booktitle = {Applied Cryptography and Network Security, Second International Conference,
{ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3089},
pages = {355--368},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/978-3-540-24852-1\_26},
doi = {10.1007/978-3-540-24852-1\_26},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acns/NascimentoMOHI04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/NascimentoMI04,
author = {Anderson C. A. Nascimento and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Hideki Imai},
editor = {Tatsuaki Okamoto},
title = {Bit String Commitment Reductions with a Non-zero Rate},
booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
2004, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2964},
pages = {179--193},
publisher = {Springer},
year = {2004},
url = {https://doi.org/10.1007/978-3-540-24660-2\_15},
doi = {10.1007/978-3-540-24660-2\_15},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ctrsa/NascimentoMI04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ImaiMN004,
author = {Hideki Imai and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Anderson C. A. Nascimento and
Andreas J. Winter},
title = {Rates for bit commitment and coin tossing from noisy correlation},
booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information
Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois,
USA, June 27 - July 2, 2004},
pages = {45},
publisher = {{IEEE}},
year = {2004},
url = {https://doi.org/10.1109/ISIT.2004.1365084},
doi = {10.1109/ISIT.2004.1365084},
timestamp = {Wed, 16 Oct 2019 14:14:48 +0200},
biburl = {https://dblp.org/rec/conf/isit/ImaiMN004.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/NascimentoOIM03,
author = {Anderson C. A. Nascimento and
Akira Otsuka and
Hideki Imai and
J{\"{o}}rn M{\"{u}}ller{-}Quade},
editor = {Marc P. C. Fossorier and
Tom H{\o}holdt and
Alain Poli},
title = {Unconditionally Secure Homomorphic Pre-distributed Commitments},
booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
15th International Symposium, AAECC-15, Toulouse, France, May 12-16,
2003, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2643},
pages = {87--97},
publisher = {Springer},
year = {2003},
url = {https://doi.org/10.1007/3-540-44828-4\_11},
doi = {10.1007/3-540-44828-4\_11},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/aaecc/NascimentoOIM03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/WinterNI03,
author = {Andreas J. Winter and
Anderson C. A. Nascimento and
Hideki Imai},
editor = {Kenneth G. Paterson},
title = {Commitment Capacity of Discrete Memoryless Channels},
booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
UK, December 16-18, 2003, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2898},
pages = {35--51},
publisher = {Springer},
year = {2003},
url = {https://doi.org/10.1007/978-3-540-40974-8\_4},
doi = {10.1007/978-3-540-40974-8\_4},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ima/WinterNI03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NascimentoMOHI03,
author = {Anderson C. A. Nascimento and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Akira Otsuka and
Goichiro Hanaoka and
Hideki Imai},
editor = {Colin Boyd and
Wenbo Mao},
title = {Unconditionally Secure Homomorphic Pre-distributed Bit Commitment
and Secure Two-Party Computations},
booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
UK, October 1-3, 2003, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {2851},
pages = {151--164},
publisher = {Springer},
year = {2003},
url = {https://doi.org/10.1007/10958513\_12},
doi = {10.1007/10958513\_12},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isw/NascimentoMOHI03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-CR-0304014,
author = {Andreas J. Winter and
Anderson C. A. Nascimento and
Hideki Imai},
title = {Commitment Capacity of Discrete Memoryless Channels},
journal = {CoRR},
volume = {cs.CR/0304014},
year = {2003},
url = {http://arxiv.org/abs/cs/0304014},
timestamp = {Fri, 10 Jan 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/corr/cs-CR-0304014.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WinterNI03,
author = {Andreas J. Winter and
Anderson C. A. Nascimento and
Hideki Imai},
title = {Commitment Capacity of Discrete Memoryless Channels},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {165},
year = {2003},
url = {http://eprint.iacr.org/2003/165},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/WinterNI03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/ImaiHSON02,
author = {Hideki Imai and
Goichiro Hanaoka and
Junji Shikata and
Akira Otsuka and
Anderson C. A. Nascimento},
title = {Cryptography with information theoretic security},
booktitle = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW}
2002, 20-25 October 2002, Bangalore, India},
pages = {73},
publisher = {{IEEE}},
year = {2002},
url = {https://doi.org/10.1109/ITW.2002.1115419},
doi = {10.1109/ITW.2002.1115419},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/NascimentoMI01,
author = {Anderson C. A. Nascimento and
J{\"{o}}rn M{\"{u}}ller{-}Quade and
Hideki Imai},
title = {Quantum Identification Protocol with Technologically Bounded Parties},
journal = {Electron. Notes Discret. Math.},
volume = {6},
pages = {15--24},
year = {2001},
url = {https://doi.org/10.1016/S1571-0653(04)00153-2},
doi = {10.1016/S1571-0653(04)00153-2},
timestamp = {Thu, 14 Oct 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/endm/NascimentoMI01.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}