iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://dblp.dagstuhl.de/pid/02/4419.bib
@article{DBLP:journals/iacr/PiskeGNT24, author = {Lucas Piske and Jeroen van de Graaf and Anderson C. A. Nascimento and Ni Trieu}, title = {Shared {OT} and Its Applications to Unconditional Secure Integer Equality, Comparison and Bit-Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {963}, year = {2024}, url = {https://eprint.iacr.org/2024/963}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiskeGNT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/npl/MelansonMKNC23, author = {David Melanson and Ricardo Maia and Hee{-}Seok Kim and Anderson C. A. Nascimento and Martine De Cock}, title = {Secure Multi-Party Computation for Personalized Human Activity Recognition}, journal = {Neural Process. Lett.}, volume = {55}, number = {3}, pages = {2127--2153}, year = {2023}, url = {https://doi.org/10.1007/s11063-023-11182-8}, doi = {10.1007/S11063-023-11182-8}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/npl/MelansonMKNC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/de/GolobPDDLCN23, author = {Steven Golob and Sikha Pentyala and Rafael Dowsley and Bernardo David and Mario Larangeira and Martine De Cock and Anderson C. A. Nascimento}, title = {A Decentralized Information Marketplace Preserving Input and Output Privacy}, booktitle = {Proceedings of the Second {ACM} Data Economy Workshop, {DEC} 2023, Seattle, WA, USA, 18 June 2023}, pages = {1--6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3600046.3600047}, doi = {10.1145/3600046.3600047}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/de/GolobPDDLCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2303-13529, author = {Tucker Stewart and Bin Yu and Anderson C. A. Nascimento and Juhua Hu}, title = {Enhancing Peak Network Traffic Prediction via Time-Series Decomposition}, journal = {CoRR}, volume = {abs/2303.13529}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.13529}, doi = {10.48550/ARXIV.2303.13529}, eprinttype = {arXiv}, eprint = {2303.13529}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-13529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/MaiaRPDCNJ23, author = {Ricardo J. M. Maia and Dustin Ray and Sikha Pentyala and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento and Ricardo Jacobi}, title = {An End-to-End Framework for Private {DGA} Detection as a Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1644}, year = {2023}, url = {https://eprint.iacr.org/2023/1644}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MaiaRPDCNJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/popets/AdamsCCDMNRS22, author = {Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen}, title = {Privacy-preserving training of tree ensembles over continuous data}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {2}, pages = {205--226}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0042}, doi = {10.2478/POPETS-2022-0042}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AdamsCCDMNRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tifs/ResendeRDNA22, author = {Amanda Cristina Davi Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha}, title = {Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {428--442}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3144007}, doi = {10.1109/TIFS.2022.3144007}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ResendeRDNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2202-02625, author = {Sikha Pentyala and Davis Railsback and Ricardo Maia and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Martine De Cock}, title = {Training Differentially Private Models with Secure Multiparty Computation}, journal = {CoRR}, volume = {abs/2202.02625}, year = {2022}, url = {https://arxiv.org/abs/2202.02625}, eprinttype = {arXiv}, eprint = {2202.02625}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-02625.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2205-11584, author = {Sikha Pentyala and Nicola Neophytou and Anderson C. A. Nascimento and Martine De Cock and Golnoosh Farnadi}, title = {PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning}, journal = {CoRR}, volume = {abs/2205.11584}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11584}, doi = {10.48550/ARXIV.2205.11584}, eprinttype = {arXiv}, eprint = {2205.11584}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11584.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2210-07332, author = {Mayana Pereira and Sikha Pentyala and Anderson C. A. Nascimento and Rafael T. de Sousa Jr. and Martine De Cock}, title = {Secure Multiparty Computation for Synthetic Data Generation from Distributed Data}, journal = {CoRR}, volume = {abs/2210.07332}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.07332}, doi = {10.48550/ARXIV.2210.07332}, eprinttype = {arXiv}, eprint = {2210.07332}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-07332.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/PentyalaRMDMNC22, author = {Sikha Pentyala and Davis Railsback and Ricardo Maia and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Martine De Cock}, title = {Training Differentially Private Models with Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2022}, url = {https://eprint.iacr.org/2022/146}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PentyalaRMDMNC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/AlvesDSN21, author = {Vin{\'{\i}}cius de Morais Alves and Rafael Dowsley and Rafael Tim{\'{o}}teo de Sousa Jr. and Anderson C. A. Nascimento}, title = {Information-Theoretically Secure String Commitments Based on Packet Reordering Channels}, journal = {{IEEE} Access}, volume = {9}, pages = {139928--139945}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3118959}, doi = {10.1109/ACCESS.2021.3118959}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlvesDSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/csr2/ZhangWBHHN21, author = {Ruichao Zhang and Shang Wang and Ren{\'{e}}e Burton and Minh Hoang and Juhua Hu and Anderson C. A. Nascimento}, title = {Clustering Analysis of Email Malware Campaigns}, booktitle = {{IEEE} International Conference on Cyber Security and Resilience, {CSR} 2021, Rhodes, Greece, July 26-28, 2021}, pages = {95--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CSR51186.2021.9527902}, doi = {10.1109/CSR51186.2021.9527902}, timestamp = {Thu, 23 Sep 2021 14:18:07 +0200}, biburl = {https://dblp.org/rec/conf/csr2/ZhangWBHHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/syscon/RibeiroSN21, author = {Admilson de Ribamar Lima Ribeiro and Reneilson Yves Carvalho Santos and Anderson Clayton Alves Nascimento}, title = {Anomaly Detection Technique for Intrusion Detection in {SDN} Environment using Continuous Data Stream Machine Learning Algorithms}, booktitle = {{IEEE} International Systems Conference, SysCon 2021, Vancouver, BC, Canada, April 15 - May 15, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SysCon48628.2021.9447092}, doi = {10.1109/SYSCON48628.2021.9447092}, timestamp = {Fri, 11 Jun 2021 11:45:39 +0200}, biburl = {https://dblp.org/rec/conf/syscon/RibeiroSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2101-07365, author = {Amanda Cristina Davi Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha}, title = {Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation}, journal = {CoRR}, volume = {abs/2101.07365}, year = {2021}, url = {https://arxiv.org/abs/2101.07365}, eprinttype = {arXiv}, eprint = {2101.07365}, timestamp = {Thu, 01 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-07365.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2103-11240, author = {Rafael Dowsley and Caleb Horst and Anderson C. A. Nascimento}, title = {Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines}, journal = {CoRR}, volume = {abs/2103.11240}, year = {2021}, url = {https://arxiv.org/abs/2103.11240}, eprinttype = {arXiv}, eprint = {2103.11240}, timestamp = {Wed, 24 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-11240.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2106-02769, author = {Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen}, title = {Privacy-Preserving Training of Tree Ensembles over Continuous Data}, journal = {CoRR}, volume = {abs/2106.02769}, year = {2021}, url = {https://arxiv.org/abs/2106.02769}, eprinttype = {arXiv}, eprint = {2106.02769}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-02769.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/ResendeRDNA21, author = {Amanda Cristina Davi Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha}, title = {Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2021}, url = {https://eprint.iacr.org/2021/069}, timestamp = {Thu, 01 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ResendeRDNA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyHN21, author = {Rafael Dowsley and Caleb Horst and Anderson C. A. Nascimento}, title = {Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2021}, url = {https://eprint.iacr.org/2021/375}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/AdamsCCDMNRS21, author = {Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen}, title = {Privacy-Preserving Training of Tree Ensembles over Continuous Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2021}, url = {https://eprint.iacr.org/2021/754}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdamsCCDMNRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/YuanSMN21, author = {Sen Yuan and Milan Shen and Ilya Mironov and Anderson C. A. Nascimento}, title = {Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {835}, year = {2021}, url = {https://eprint.iacr.org/2021/835}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanSMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/SivaguruPONC20, author = {Raaghavi Sivaguru and Jonathan Peck and Femi G. Olumofin and Anderson C. A. Nascimento and Martine De Cock}, title = {Inline Detection of {DGA} Domains Using Side Information}, journal = {{IEEE} Access}, volume = {8}, pages = {141910--141922}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3013494}, doi = {10.1109/ACCESS.2020.3013494}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SivaguruPONC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/entropy/DowsleyMN20, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {On the Composability of Statistically Secure Random Oblivious Transfer}, journal = {Entropy}, volume = {22}, number = {1}, pages = {107}, year = {2020}, url = {https://doi.org/10.3390/e22010107}, doi = {10.3390/E22010107}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entropy/DowsleyMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijmtm/NascimentoTASN20, author = {Anderson C. A. Nascimento and Eduardo Tavares and Gabriel Alves de Albuquerque and Erica Sousa and Bruno Costa e Silva Nogueira}, title = {Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry}, journal = {Int. J. Manuf. Technol. Manag.}, volume = {34}, number = {2}, pages = {126--147}, year = {2020}, url = {https://doi.org/10.1504/IJMTM.2020.106209}, doi = {10.1504/IJMTM.2020.106209}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmtm/NascimentoTASN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/CrepeauDN20, author = {Claude Cr{\'{e}}peau and Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Commitment Capacity of Unfair Noisy Channels}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {6}, pages = {3745--3752}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2967048}, doi = {10.1109/TIT.2020.2967048}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CrepeauDN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2002-05377, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki}, title = {High Performance Logistic Regression for Privacy-Preserving Genome Analysis}, journal = {CoRR}, volume = {abs/2002.05377}, year = {2020}, url = {https://arxiv.org/abs/2002.05377}, eprinttype = {arXiv}, eprint = {2002.05377}, timestamp = {Fri, 14 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-05377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-2003-05703, author = {Raaghavi Sivaguru and Jonathan Peck and Femi G. Olumofin and Anderson C. A. Nascimento and Martine De Cock}, title = {Inline Detection of {DGA} Domains Using Side Information}, journal = {CoRR}, volume = {abs/2003.05703}, year = {2020}, url = {https://arxiv.org/abs/2003.05703}, eprinttype = {arXiv}, eprint = {2003.05703}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05703.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CockDNRST20, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki}, title = {High Performance Logistic Regression for Privacy-Preserving Genome Analysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2020}, url = {https://eprint.iacr.org/2020/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CockDNRST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/YuPGHCNC19, author = {Bin Yu and Jie Pan and Daniel L. Gray and Jiaming Hu and Chhaya Choudhary and Anderson C. A. Nascimento and Martine De Cock}, title = {Weakly Supervised Deep Learning for the Detection of Domain Generation Algorithms}, journal = {{IEEE} Access}, volume = {7}, pages = {51542--51556}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2911522}, doi = {10.1109/ACCESS.2019.2911522}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/YuPGHCNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/access/PeckNSGOYNC19, author = {Jonathan Peck and Claire Nie and Raaghavi Sivaguru and Charles Grumer and Femi G. Olumofin and Bin Yu and Anderson C. A. Nascimento and Martine De Cock}, title = {CharBot: {A} Simple and Effective Method for Evading {DGA} Classifiers}, journal = {{IEEE} Access}, volume = {7}, pages = {91759--91771}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2927075}, doi = {10.1109/ACCESS.2019.2927075}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PeckNSGOYNC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tdsc/CockDHKNPT19, author = {Martine De Cock and Rafael Dowsley and Caleb Horst and Raj S. Katti and Anderson C. A. Nascimento and Wing{-}Sea Poon and Stacey Truex}, title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {2}, pages = {217--230}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2679189}, doi = {10.1109/TDSC.2017.2679189}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CockDHKNPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/YuGNH19, author = {Bin Yu and Giovanna Graciani and Anderson C. A. Nascimento and Juhua Hu}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {Cost-adaptive Neural Networks for Peak Volume Prediction with {EMM} Filtering}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {4208--4213}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006188}, doi = {10.1109/BIGDATA47090.2019.9006188}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/YuGNH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/GrumerPONC19, author = {Charles Grumer and Jonathan Peck and Femi G. Olumofin and Anderson C. A. Nascimento and Martine De Cock}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {Hardening {DGA} Classifiers Utilizing {IVAP}}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {6063--6065}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9006398}, doi = {10.1109/BIGDATA47090.2019.9006398}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/GrumerPONC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/fedcsis/RibeiroON19, author = {Admilson de Ribamar Lima Ribeiro and Edward David Moreno Ordonez and Anderson Clayton Alves Nascimento}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {A Framework for Network Intrusion Detection using Network Programmability and Data Stream Clustering Machine Learning Algorithms}, booktitle = {Preprints of Communication Papers of the 2019 Federated Conference on Computer Science and Information Systems, FedCSIS 2019, Leipzig, Germany, September 1-4, 2019}, series = {Annals of Computer Science and Information Systems}, volume = {20}, pages = {57--63}, year = {2019}, url = {https://doi.org/10.15439/2019F87}, doi = {10.15439/2019F87}, timestamp = {Tue, 23 Apr 2024 10:06:26 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/RibeiroON19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/nips/ReichTDCN19, author = {Devin Reich and Ariel Todoki and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {3752--3764}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/a501bebf79d570651ff601788ea9d16d-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/ReichTDCN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1905-01078, author = {Jonathan Peck and Claire Nie and Raaghavi Sivaguru and Charles Grumer and Femi G. Olumofin and Bin Yu and Anderson C. A. Nascimento and Martine De Cock}, title = {CharBot: {A} Simple and Effective Method for Evading {DGA} Classifiers}, journal = {CoRR}, volume = {abs/1905.01078}, year = {2019}, url = {http://arxiv.org/abs/1905.01078}, eprinttype = {arXiv}, eprint = {1905.01078}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-01078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1905-10921, author = {Claude Cr{\'{e}}peau and Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Commitment Capacity of Unfair Noisy Channels}, journal = {CoRR}, volume = {abs/1905.10921}, year = {2019}, url = {http://arxiv.org/abs/1905.10921}, eprinttype = {arXiv}, eprint = {1905.10921}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1906-02325, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Devin Reich and Ariel Todoki}, title = {Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection}, journal = {CoRR}, volume = {abs/1906.02325}, year = {2019}, url = {http://arxiv.org/abs/1906.02325}, eprinttype = {arXiv}, eprint = {1906.02325}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-02325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1907-01586, author = {Anisha Agarwal and Rafael Dowsley and Nicholas D. McKinney and Dongrui Wu and Chin{-}Teng Lin and Martine De Cock and Anderson C. A. Nascimento}, title = {Protecting Privacy of Users in Brain-Computer Interface Applications}, journal = {CoRR}, volume = {abs/1907.01586}, year = {2019}, url = {http://arxiv.org/abs/1907.01586}, eprinttype = {arXiv}, eprint = {1907.01586}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-01586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CrepeauDN19, author = {Claude Cr{\'{e}}peau and Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Commitment Capacity of Unfair Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2019}, url = {https://eprint.iacr.org/2019/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CrepeauDN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CockDNRT19, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Devin Reich and Ariel Todoki}, title = {Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2019}, url = {https://eprint.iacr.org/2019/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CockDNRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/DowsleyLN18, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Commitment and Oblivious Transfer in the Bounded Storage Model With Errors}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {8}, pages = {5970--5984}, year = {2018}, url = {https://doi.org/10.1109/TIT.2018.2796128}, doi = {10.1109/TIT.2018.2796128}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DowsleyLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/FritchmanSDHCNT18, author = {Kyle Fritchman and Keerthanaa Saminathan and Rafael Dowsley and Tyler Hughes and Martine De Cock and Anderson C. A. Nascimento and Ankur Teredesai}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {Privacy-Preserving Scoring of Tree Ensembles: {A} Novel Framework for {AI} in Healthcare}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {2413--2422}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622627}, doi = {10.1109/BIGDATA.2018.8622627}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/FritchmanSDHCNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/SivaguruCYTNC18, author = {Raaghavi Sivaguru and Chhaya Choudhary and Bin Yu and Vadym Tymchenko and Anderson C. A. Nascimento and Martine De Cock}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {An Evaluation of {DGA} Classifiers}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {5058--5067}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8621875}, doi = {10.1109/BIGDATA.2018.8621875}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/SivaguruCYTNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/AgarwalDMWLCN18, author = {Anisha Agarwal and Rafael Dowsley and Nicholas D. McKinney and Dongrui Wu and Chin{-}Teng Lin and Martine De Cock and Anderson C. A. Nascimento}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {Privacy-Preserving Linear Regression for Brain-Computer Interface Applications}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {5277--5278}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8621861}, doi = {10.1109/BIGDATA.2018.8621861}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/AgarwalDMWLCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/bigdataconf/BhagatSADCN18, author = {Sanchya Bhagat and Keerthanaa Saminathan and Anisha Agarwal and Rafael Dowsley and Martine De Cock and Anderson C. A. Nascimento}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {Privacy-Preserving User Profiling with Facebook Likes}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {5298--5299}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622081}, doi = {10.1109/BIGDATA.2018.8622081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/BhagatSADCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/evalita/AhluwaliaSCNC18, author = {Resham Ahluwalia and Himani Soni and Edward Callow and Anderson C. A. Nascimento and Martine De Cock}, editor = {Tommaso Caselli and Nicole Novielli and Viviana Patti and Paolo Rosso}, title = {Detecting Hate Speech Against Women in English Tweets}, booktitle = {Proceedings of the Sixth Evaluation Campaign of Natural Language Processing and Speech Tools for Italian. Final Workshop {(EVALITA} 2018) co-located with the Fifth Italian Conference on Computational Linguistics (CLiC-it 2018), Turin, Italy, December 12-13, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2263}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2263/paper032.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:20 +0100}, biburl = {https://dblp.org/rec/conf/evalita/AhluwaliaSCNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ijcnn/YuPHNC18, author = {Bin Yu and Jie Pan and Jiaming Hu and Anderson C. A. Nascimento and Martine De Cock}, title = {Character Level based Detection of {DGA} Domain Names}, booktitle = {2018 International Joint Conference on Neural Networks, {IJCNN} 2018, Rio de Janeiro, Brazil, July 8-13, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IJCNN.2018.8489147}, doi = {10.1109/IJCNN.2018.8489147}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/YuPHNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/raid/PereiraCYCN18, author = {Mayana Pereira and Shaun Coleman and Bin Yu and Martine De Cock and Anderson C. A. Nascimento}, editor = {Michael D. Bailey and Thorsten Holz and Manolis Stamatogiannakis and Sotiris Ioannidis}, title = {Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive {DNS} Traffic}, booktitle = {Research in Attacks, Intrusions, and Defenses - 21st International Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11050}, pages = {295--314}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00470-5\_14}, doi = {10.1007/978-3-030-00470-5\_14}, timestamp = {Mon, 20 Nov 2023 09:00:29 +0100}, biburl = {https://dblp.org/rec/conf/raid/PereiraCYCN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sepln/AhluwaliaSCNC18, author = {Resham Ahluwalia and Evgeniia Shcherbinina and Edward Callow and Anderson C. A. Nascimento and Martine De Cock}, editor = {Paolo Rosso and Julio Gonzalo and Raquel Mart{\'{\i}}nez and Soto Montalvo and Jorge Carrillo de Albornoz}, title = {Detecting Misogynous Tweets}, booktitle = {Proceedings of the Third Workshop on Evaluation of Human Language Technologies for Iberian Languages (IberEval 2018) co-located with 34th Conference of the Spanish Society for Natural Language Processing {(SEPLN} 2018), Sevilla, Spain, September 18th, 2018}, series = {{CEUR} Workshop Proceedings}, volume = {2150}, pages = {242--248}, publisher = {CEUR-WS.org}, year = {2018}, url = {https://ceur-ws.org/Vol-2150/AMI\_paper3.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:59 +0100}, biburl = {https://dblp.org/rec/conf/sepln/AhluwaliaSCNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/sscc/ChoudharySPYNC18, author = {Chhaya Choudhary and Raaghavi Sivaguru and Mayana Pereira and Bin Yu and Anderson C. A. Nascimento and Martine De Cock}, editor = {Sabu M. Thampi and Sanjay Madria and Guojun Wang and Danda B. Rawat and Jos{\'{e}} M. Alcaraz Calero}, title = {Algorithmically Generated Domain Detection and Malware Family Classification}, booktitle = {Security in Computing and Communications - 6th International Symposium, {SSCC} 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {969}, pages = {640--655}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5826-5\_50}, doi = {10.1007/978-981-13-5826-5\_50}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/sscc/ChoudharySPYNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1808-10145, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {On the Composability of Statistically Secure Random Oblivious Transfer}, journal = {CoRR}, volume = {abs/1808.10145}, year = {2018}, url = {http://arxiv.org/abs/1808.10145}, eprinttype = {arXiv}, eprint = {1808.10145}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-10145.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1808-10151, author = {Sisi Wang and Wing{-}Sea Poon and Golnoosh Farnadi and Caleb Horst and Kebra Thompson and Michael Nickels and Rafael Dowsley and Anderson C. A. Nascimento and Martine De Cock}, title = {VirtualIdentity: Privacy-Preserving User Profiling}, journal = {CoRR}, volume = {abs/1808.10151}, year = {2018}, url = {http://arxiv.org/abs/1808.10151}, eprinttype = {arXiv}, eprint = {1808.10151}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-10151.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/concurrency/SouzaGLPN17, author = {S. M. P. C. Souza and R. F. Gon{\c{c}}alves and E. Leonova and R. S. Puttini and Anderson C. A. Nascimento}, title = {Privacy-ensuring electronic health records in the cloud}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {11}, year = {2017}, url = {https://doi.org/10.1002/cpe.4045}, doi = {10.1002/CPE.4045}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SouzaGLPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/DowsleyN17, author = {Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels Against Malicious Adversaries: The Case of Low Erasure Probability}, journal = {{IEEE} Trans. Inf. Theory}, volume = {63}, number = {10}, pages = {6819--6826}, year = {2017}, url = {https://doi.org/10.1109/TIT.2017.2735423}, doi = {10.1109/TIT.2017.2735423}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DowsleyN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icdm/YuGPCN17, author = {Bin Yu and Daniel L. Gray and Jie Pan and Martine De Cock and Anderson C. A. Nascimento}, editor = {Raju Gottumukkala and Xia Ning and Guozhu Dong and Vijay Raghavan and Srinivas Aluru and George Karypis and Lucio Miele and Xindong Wu}, title = {Inline {DGA} Detection with Deep Networks}, booktitle = {2017 {IEEE} International Conference on Data Mining Workshops, {ICDM} Workshops 2017, New Orleans, LA, USA, November 18-21, 2017}, pages = {683--692}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDMW.2017.96}, doi = {10.1109/ICDMW.2017.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/YuGPCN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1710-08256, author = {Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the {ROM}}, journal = {CoRR}, volume = {abs/1710.08256}, year = {2017}, url = {http://arxiv.org/abs/1710.08256}, eprinttype = {arXiv}, eprint = {1710.08256}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-08256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/BarretoDDMN17, author = {Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the {ROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {993}, year = {2017}, url = {http://eprint.iacr.org/2017/993}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoDDMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/sensors/GondimANGK16, author = {Jo{\~{a}}o Jos{\'{e}} Costa Gondim and Robson de Oliveira Albuquerque and Anderson Clayton Alves Nascimento and Luis Javier Garc{\'{\i}}a{-}Villalba and Tai{-}Hoon Kim}, title = {A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things}, journal = {Sensors}, volume = {16}, number = {11}, pages = {1855}, year = {2016}, url = {https://doi.org/10.3390/s16111855}, doi = {10.3390/S16111855}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/GondimANGK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tifs/DavidDGMNP16, author = {Bernardo Machado David and Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento and Adriana C. B. Pinto}, title = {Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {59--73}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2476783}, doi = {10.1109/TIFS.2015.2476783}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DavidDGMNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/asunam/WangPFHTNNC16, author = {Sisi Wang and Wing{-}Sea Poon and Golnoosh Farnadi and Caleb Horst and Kebra Thompson and Michael Nickels and Anderson C. A. Nascimento and Martine De Cock}, editor = {Ravi Kumar and James Caverlee and Hanghang Tong}, title = {VirtualIdentity: Privacy preserving user profiling}, booktitle = {2016 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2016, San Francisco, CA, USA, August 18-21, 2016}, pages = {1434--1437}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ASONAM.2016.7752438}, doi = {10.1109/ASONAM.2016.7752438}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/WangPFHTNNC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/icits/2016, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2}, doi = {10.1007/978-3-319-49175-2}, isbn = {978-3-319-49174-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @proceedings{DBLP:conf/isw/2016, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7}, doi = {10.1007/978-3-319-45871-7}, isbn = {978-3-319-45870-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CockDHKNNP16, author = {Martine De Cock and Rafael Dowsley and Caleb Horst and Raj S. Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing{-}Sea Poon}, title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {736}, year = {2016}, url = {http://eprint.iacr.org/2016/736}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CockDHKNNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/cj/PereiraDNH15, author = {Mayana Pereira and Rafael Dowsley and Anderson C. A. Nascimento and Goichiro Hanaoka}, title = {Public-Key Encryption Schemes with Bounded {CCA} Security and Optimal Ciphertext Length Based on the {CDH} and {HDH} Assumptions}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2738--2746}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxv040}, doi = {10.1093/COMJNL/BXV040}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/PereiraDNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ijisec/TonicelliNDMIHO15, author = {Rafael Tonicelli and Anderson C. A. Nascimento and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Hideki Imai and Goichiro Hanaoka and Akira Otsuka}, title = {Information-theoretically secure oblivious polynomial evaluation in the commodity-based model}, journal = {Int. J. Inf. Sec.}, volume = {14}, number = {1}, pages = {73--84}, year = {2015}, url = {https://doi.org/10.1007/s10207-014-0247-8}, doi = {10.1007/S10207-014-0247-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TonicelliNDMIHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ccs/CockDNN15, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Stacey C. Newman}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren and Christos Dimitrakakis and Aikaterini Mitrokotsa and Arunesh Sinha}, title = {Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data}, booktitle = {Proceedings of the 8th {ACM} Workshop on Artificial Intelligence and Security, AISec 2015, Denver, Colorado, USA, October 16, 2015}, pages = {3--14}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808769.2808774}, doi = {10.1145/2808769.2808774}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CockDNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/provsec/DavidDKN15, author = {Bernardo Machado David and Rafael Dowsley and Raj S. Katti and Anderson C. A. Nascimento}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {354--367}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_20}, doi = {10.1007/978-3-319-26059-4\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DavidDKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/smc/GoncalvesTNSLA15, author = {Rosiberto Dos Santos Gon{\c{c}}alves and Eduardo Antonio Guimar{\~{a}}es Tavares and Anderson C. A. Nascimento and Erica Sousa and Fernando Ant{\^{o}}nio Aires Lins and Gabriel Alves}, title = {Performability Assessment of a Government Process in the Cloud}, booktitle = {2015 {IEEE} International Conference on Systems, Man, and Cybernetics, Kowloon Tong, Hong Kong, October 9-12, 2015}, pages = {87--92}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SMC.2015.28}, doi = {10.1109/SMC.2015.28}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/smc/GoncalvesTNSLA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/DowsleyLN15, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Commitment and Oblivious Transfer in the Bounded Storage Model with Errors}, journal = {CoRR}, volume = {abs/1510.06623}, year = {2015}, url = {http://arxiv.org/abs/1510.06623}, eprinttype = {arXiv}, eprint = {1510.06623}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DowsleyLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyLN15, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Commitment and Oblivious Transfer in the Bounded Storage Model with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2015}, url = {http://eprint.iacr.org/2015/952}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/cans/DavidDN14, author = {Bernardo David and Rafael Dowsley and Anderson C. A. Nascimento}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Universally Composable Oblivious Transfer Based on a Variant of {LPN}}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {143--158}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_10}, doi = {10.1007/978-3-319-12280-9\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DavidDN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/gis/KhotHNKTA14, author = {Amruta Khot and Abdeltawab M. Hendawi and Anderson C. A. Nascimento and Raj S. Katti and Ankur Teredesai and Mohamed H. Ali}, editor = {Chengyang Zhang and Anas Basalamah and Abdeltawab M. Hendawi and Phuc Nguyen}, title = {Road network compression techniques in spatiotemporal embedded systems: a survey}, booktitle = {Proceedings of the 5th {ACM} {SIGSPATIAL} International Workshop on GeoStreaming, {IWGS} '14, Dallas, Texas, USA, November 4, 2014}, pages = {33--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2676552.2676645}, doi = {10.1145/2676552.2676645}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/KhotHNKTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/DowsleyLN14, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Oblivious transfer in the bounded storage model with errors}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1623--1627}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875108}, doi = {10.1109/ISIT.2014.6875108}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/DowsleyLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/smc/NascimentoASNT14, author = {Anderson C. A. Nascimento and Gabriel Alves and Erica Sousa and Bruno Costa e Silva Nogueira and Eduardo Antonio Guimar{\~{a}}es Tavares}, title = {Transport mode assessment for inbound logistics: {A} study based on coffee industry}, booktitle = {2014 {IEEE} International Conference on Systems, Man, and Cybernetics, {SMC} 2014, San Diego, CA, USA, October 5-8, 2014}, pages = {1318--1323}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/SMC.2014.6974097}, doi = {10.1109/SMC.2014.6974097}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smc/NascimentoASNT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/DowsleyN14, author = {Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries}, journal = {CoRR}, volume = {abs/1410.2862}, year = {2014}, url = {http://arxiv.org/abs/1410.2862}, eprinttype = {arXiv}, eprint = {1410.2862}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DowsleyN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyN14, author = {Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {823}, year = {2014}, url = {http://eprint.iacr.org/2014/823}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/DowsleyGMN12, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {Oblivious Transfer Based on the McEliece Assumptions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {2}, pages = {567--575}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.567}, doi = {10.1587/TRANSFUN.E95.A.567}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DowsleyGMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/DavidNS12, author = {Bernardo Machado David and Anderson C. A. Nascimento and Rafael T. de Sousa Jr.}, title = {Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {11}, pages = {2059--2066}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.2059}, doi = {10.1587/TRANSFUN.E95.A.2059}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DavidNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/DottlingDMN12, author = {Nico D{\"{o}}ttling and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Variant of the McEliece Cryptosystem}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {10}, pages = {6672--6680}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2203582}, doi = {10.1109/TIT.2012.2203582}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DottlingDMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/asiacrypt/DottlingMN12, author = {Nico D{\"{o}}ttling and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Xiaoyun Wang and Kazue Sako}, title = {{IND-CCA} Secure Cryptography Based on a Variant of the {LPN} Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {485--503}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_30}, doi = {10.1007/978-3-642-34961-4\_30}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DottlingMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icce-berlin/MelgarZMN12, author = {Max E. Vizcarra Melgar and Alexandre Zaghetto and Bruno Macchiavello and Anderson C. A. Nascimento}, title = {{CQR} codes: Colored quick-response codes}, booktitle = {{IEEE} Second International Conference on Consumer Electronics - Berlin, ICCE-Berlin 2012, Berlin, Germany, September 3-5, 2012}, pages = {321--325}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICCE-Berlin.2012.6336526}, doi = {10.1109/ICCE-BERLIN.2012.6336526}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icce-berlin/MelgarZMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icits/DavidNM12, author = {Bernardo Machado David and Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Adam D. Smith}, title = {Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions}, booktitle = {Information Theoretic Security - 6th International Conference, {ICITS} 2012, Montreal, QC, Canada, August 15-17, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7412}, pages = {80--99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32284-6\_5}, doi = {10.1007/978-3-642-32284-6\_5}, timestamp = {Tue, 20 Aug 2024 08:48:08 +0200}, biburl = {https://dblp.org/rec/conf/icits/DavidNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1205-5224, author = {Nico D{\"{o}}ttling and Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Variant of the McEliece Cryptosystem}, journal = {CoRR}, volume = {abs/1205.5224}, year = {2012}, url = {http://arxiv.org/abs/1205.5224}, eprinttype = {arXiv}, eprint = {1205.5224}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1205-5224.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/DowsleyMOHIN11, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {2}, pages = {725--734}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.725}, doi = {10.1587/TRANSFUN.E94.A.725}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DowsleyMOHIN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/CarrijoTN11, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento}, title = {A Fault Analytic Method against HB\({}^{\mbox{+}}\)}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {2}, pages = {855--859}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.855}, doi = {10.1587/TRANSFUN.E94.A.855}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/CarrijoTN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/PintoDMN11, author = {Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {8}, pages = {5566--5571}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2158898}, doi = {10.1109/TIT.2011.2158898}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/PintoDMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itw/DavidN11, author = {Bernardo Machado David and Anderson C. A. Nascimento}, title = {Efficient fully simulatable oblivious transfer from the McEliece assumptions}, booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil, October 16-20, 2011}, pages = {638--642}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ITW.2011.6089575}, doi = {10.1109/ITW.2011.6089575}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/DavidN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DavidNT11, author = {Bernardo Machado David and Anderson C. A. Nascimento and Rafael Tonicelli}, title = {A Framework for Secure Single Sign-On}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {246}, year = {2011}, url = {http://eprint.iacr.org/2011/246}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isw/PereiraDHN10, author = {Mayana Pereira and Rafael Dowsley and Goichiro Hanaoka and Anderson C. A. Nascimento}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Public Key Encryption Schemes with Bounded {CCA} Security and Optimal Ciphertext Length Based on the {CDH} Assumption}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {299--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_26}, doi = {10.1007/978-3-642-18178-8\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/PereiraDHN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wisa/DowsleyHIN10, author = {Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {Round-Optimal Deniable Ring Authentication in the Presence of Big Brother}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {307--321}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_23}, doi = {10.1007/978-3-642-17955-6\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wisa/DowsleyGMN10, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {337--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_25}, doi = {10.1007/978-3-642-17955-6\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/abs-1010-0756, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento}, title = {A Fault Analytic Method against {HB+}}, journal = {CoRR}, volume = {abs/1010.0756}, year = {2010}, url = {http://arxiv.org/abs/1010.0756}, eprinttype = {arXiv}, eprint = {1010.0756}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1010-0756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyGMN10, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2010}, url = {http://eprint.iacr.org/2010/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CarrijoTN10, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento}, title = {A Fault Analytic Method against {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {508}, year = {2010}, url = {http://eprint.iacr.org/2010/508}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrijoTN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/ieicet/CarrijoTIN09, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento}, title = {A Novel Probabilistic Passive Attack on the Protocols {HB} and HB\({}^{\mbox{+}}\)}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {2}, pages = {658--662}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.658}, doi = {10.1587/TRANSFUN.E92.A.658}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/CarrijoTIN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ctrsa/DowsleyMN09, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Marc Fischlin}, title = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {240--251}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_16}, doi = {10.1007/978-3-642-00862-7\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DowsleyMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/TonicelliDHIMON09, author = {Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Anderson C. A. Nascimento}, title = {Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {270}, year = {2009}, url = {http://eprint.iacr.org/2009/270}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TonicelliDHIMON09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyHIN09, author = {Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2009}, url = {http://eprint.iacr.org/2009/271}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyHIN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyMOHIN09, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2009}, url = {http://eprint.iacr.org/2009/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyMOHIN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/PintoDMN09, author = {Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2009}, url = {http://eprint.iacr.org/2009/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PintoDMN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/NascimentoW08, author = {Anderson C. A. Nascimento and Andreas J. Winter}, title = {On the Oblivious-Transfer Capacity of Noisy Resources}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2572--2581}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921856}, doi = {10.1109/TIT.2008.921856}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/NascimentoW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/tit/NascimentoBSI08, author = {Anderson C. A. Nascimento and Jo{\~{a}}o Barros and Stefan Skludarek and Hideki Imai}, title = {The Commitment Capacity of the Gaussian Channel Is Infinite}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2785--2789}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921686}, doi = {10.1109/TIT.2008.921686}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/NascimentoBSI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icits/DowsleyGMN08, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, editor = {Reihaneh Safavi{-}Naini}, title = {Oblivious Transfer Based on the McEliece Assumptions}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {107--117}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_11}, doi = {10.1007/978-3-540-85093-9\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DowsleyGMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyGMN08, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {Oblivious Transfer based on the McEliece Assumptions\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {138}, year = {2008}, url = {http://eprint.iacr.org/2008/138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/CarrijoTIN08, author = {Jos{\'{e}} Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C. A. Nascimento}, title = {A Novel Probabilistic Passive Attack on the Protocols {HB} and {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {231}, year = {2008}, url = {http://eprint.iacr.org/2008/231}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrijoTIN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyGMN08a, author = {Rafael Dowsley and Jeroen van de Graaf and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {On the Composability of Statistically Secure Bit Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2008}, url = {http://eprint.iacr.org/2008/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyGMN08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/DowsleyMN08, author = {Rafael Dowsley and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento}, title = {A {CCA2} Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2008}, url = {http://eprint.iacr.org/2008/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DowsleyMN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/icits/ImaiMN07, author = {Hideki Imai and Kirill Morozov and Anderson C. A. Nascimento}, editor = {Yvo Desmedt}, title = {Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {183--194}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_16}, doi = {10.1007/978-3-642-10230-1\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ImaiMN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/apnoms/CrispimPNAS06, author = {Hon{\'{o}}rio Assis Filho Crispim and Eduardo T. L. Pastor and Anderson C. A. Nascimento and Humberto Abdalla Jr. and Antonio Jos{\'{e}} Martins Soares}, editor = {Young{-}Tak Kim and Makoto Takano}, title = {{IP/WDM} Optical Network Testbed: Design and Implementation}, booktitle = {Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, {APNOMS} 2006 Busan, Korea, September 27-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4238}, pages = {441--450}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11876601\_45}, doi = {10.1007/11876601\_45}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/apnoms/CrispimPNAS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/ImaiMN06, author = {Hideki Imai and Kirill Morozov and Anderson C. A. Nascimento}, title = {On the Oblivious Transfer Capacity of the Erasure Channel}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1428--1431}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262082}, doi = {10.1109/ISIT.2006.262082}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/ImaiMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/ImaiMNW06, author = {Hideki Imai and Kirill Morozov and Anderson C. A. Nascimento and Andreas J. Winter}, title = {Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1432--1436}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262083}, doi = {10.1109/ISIT.2006.262083}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/ImaiMNW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/BarrosINS06, author = {Jo{\~{a}}o Barros and Hideki Imai and Anderson C. A. Nascimento and Stefan Skludarek}, title = {Bit Commitment over Gaussian Channels}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1437--1441}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.262084}, doi = {10.1109/ISIT.2006.262084}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/BarrosINS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/Nascimento006, author = {Anderson C. A. Nascimento and Andreas J. Winter}, title = {On the Oblivious Transfer Capacity of Noisy Correlations}, booktitle = {Proceedings 2006 {IEEE} International Symposium on Information Theory, {ISIT} 2006, The Westin Seattle, Seattle, Washington, USA, July 9-14, 2006}, pages = {1871--1875}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ISIT.2006.261805}, doi = {10.1109/ISIT.2006.261805}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/Nascimento006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/qic/ImaiMNTW05, author = {Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento and Pim Tuyls and Andreas J. Winter}, title = {An information theoretical model for quantum secret sharing}, journal = {Quantum Inf. Comput.}, volume = {5}, number = {1}, pages = {69--80}, year = {2005}, url = {https://doi.org/10.26421/QIC5.1-7}, doi = {10.26421/QIC5.1-7}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/ImaiMNTW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/wisa/YamamotoCNSU05, author = {Go Yamamoto and Koji Chida and Anderson C. A. Nascimento and Koutarou Suzuki and Shigenori Uchiyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {328--342}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_26}, doi = {10.1007/11604938\_26}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YamamotoCNSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acisp/HanaokaIMNOW04, author = {Goichiro Hanaoka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento and Akira Otsuka and Andreas J. Winter}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {62--73}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_6}, doi = {10.1007/978-3-540-27800-9\_6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/acns/NascimentoMOHI04, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {355--368}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_26}, doi = {10.1007/978-3-540-24852-1\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NascimentoMOHI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ctrsa/NascimentoMI04, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Hideki Imai}, editor = {Tatsuaki Okamoto}, title = {Bit String Commitment Reductions with a Non-zero Rate}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {179--193}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_15}, doi = {10.1007/978-3-540-24660-2\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/NascimentoMI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isit/ImaiMN004, author = {Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade and Anderson C. A. Nascimento and Andreas J. Winter}, title = {Rates for bit commitment and coin tossing from noisy correlation}, booktitle = {Proceedings of the 2004 {IEEE} International Symposium on Information Theory, {ISIT} 2004, Chicago Downtown Marriott, Chicago, Illinois, USA, June 27 - July 2, 2004}, pages = {45}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ISIT.2004.1365084}, doi = {10.1109/ISIT.2004.1365084}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/ImaiMN004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/aaecc/NascimentoOIM03, author = {Anderson C. A. Nascimento and Akira Otsuka and Hideki Imai and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Marc P. C. Fossorier and Tom H{\o}holdt and Alain Poli}, title = {Unconditionally Secure Homomorphic Pre-distributed Commitments}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2643}, pages = {87--97}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44828-4\_11}, doi = {10.1007/3-540-44828-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/NascimentoOIM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/ima/WinterNI03, author = {Andreas J. Winter and Anderson C. A. Nascimento and Hideki Imai}, editor = {Kenneth G. Paterson}, title = {Commitment Capacity of Discrete Memoryless Channels}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {35--51}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_4}, doi = {10.1007/978-3-540-40974-8\_4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ima/WinterNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/isw/NascimentoMOHI03, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai}, editor = {Colin Boyd and Wenbo Mao}, title = {Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {151--164}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_12}, doi = {10.1007/10958513\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/NascimentoMOHI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/corr/cs-CR-0304014, author = {Andreas J. Winter and Anderson C. A. Nascimento and Hideki Imai}, title = {Commitment Capacity of Discrete Memoryless Channels}, journal = {CoRR}, volume = {cs.CR/0304014}, year = {2003}, url = {http://arxiv.org/abs/cs/0304014}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0304014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/iacr/WinterNI03, author = {Andreas J. Winter and Anderson C. A. Nascimento and Hideki Imai}, title = {Commitment Capacity of Discrete Memoryless Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2003}, url = {http://eprint.iacr.org/2003/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WinterNI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @inproceedings{DBLP:conf/itw/ImaiHSON02, author = {Hideki Imai and Goichiro Hanaoka and Junji Shikata and Akira Otsuka and Anderson C. A. Nascimento}, title = {Cryptography with information theoretic security}, booktitle = {Proceedings of the 2002 {IEEE} Information Theory Workshop, {ITW} 2002, 20-25 October 2002, Bangalore, India}, pages = {73}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ITW.2002.1115419}, doi = {10.1109/ITW.2002.1115419}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/ImaiHSON02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} } @article{DBLP:journals/endm/NascimentoMI01, author = {Anderson C. A. Nascimento and J{\"{o}}rn M{\"{u}}ller{-}Quade and Hideki Imai}, title = {Quantum Identification Protocol with Technologically Bounded Parties}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {15--24}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00153-2}, doi = {10.1016/S1571-0653(04)00153-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/endm/NascimentoMI01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }