UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Jump to: A | B | E | G | K | L | R | Z
Number of items: 15.

A

Ambainis, A; Jakobsson, M; Lipmaa, H; (2004) Cryptographic Randomized Response Techniques. In: (Proceedings) DIMACS/PORTIA Workshop on Privacy-Preserving Data Mining.

Ambainis, A; Jakobsson, M; Lipmaa, H; (2004) Cryptographic Randomized Response Techniques. In: Bao, F and Deng, RH and Zhou, J, (eds.) Lecture Notes in Computer Science. (pp. 425 - 438). Springer-Verlag

B

Boykov, Y.; Kolmogorov, V.; (2004) An experimental comparison of min-cut/max- flow algorithms for energy minimization in vision. IEEE Transactions on Pattern Analysis and Machine Intelligence , 26 (9) pp. 1124-1137. 10.1109/TPAMI.2004.60. Green open access
file

E

Elkind, E; Lipmaa, H; (2004) How Hard is it to Manipulate Voting? In: (Proceedings) DIMACS Workshop on Electronic Voting.

Elkind, E; Lipmaa, H; (2004) Interleaving Cryptography and Mechanism Design: The Case of Online Auctions. In: Juels, A, (ed.) Lecture Notes in Computer Science. (pp. 117 - 131). Springer-Verlag

G

Gillies, M.; Crabtree , I.B.; Ballin, D.; (2004) Customisation and Context for Expressive Behaviour in the Broadband World. BT Technology Journal , 22 (02) pp. 7-17. 10.1023/B:BTTJ.0000033466.91160.eb. Green open access
file

Goethals, B; Laur, L; Lipmaa, H; Mielikäinen, T; (2004) On Private Scalar Product Computation for Privacy-Preserving Data Mining. In: Park, C and Chee, S, (eds.) Lecture Notes in Computer Science. (pp. 104 - 120). Springer-Verlag

K

Kurosawa, K.; Desmedt, Y.; (2004) A new paradigm of hybrid encryption scheme. In: Franklin, M., (ed.) Advances in Cryptology – CRYPTO 2004: 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 2004. Proceedings. (pp. pp. 426-442). Springer Verlag: Berlin/ Heidelberg, Germany.

L

Laur, L; Lipmaa, H; (2004) On Private Similarity Search Protocols. In: Liimatainen, S and Virtanen, T, (eds.) (Proceedings) Proceedings of the 9th Nordic Workshop on Secure IT Systems (NordSec 2004). (pp. 73 - 77). Helsinki University of Technology

Lipmaa, H; (2004) An Oblivious Transfer Protocol with Log-Squared Communication. (IACR ePrint Archive 2004/063 ). IACR

Lipmaa, H; (2004) Statistical Zero-Knowledge Arguments: Theory and Practice. In: (Proceedings) 4th European Congress on Computational Methods in Applied Sciences and Engineering (ECCOMAS 2004).

Lipmaa, H; Wallén, J; Dumas, P; (2004) On the Additive Differential Probability of Exclusive-Or. In: Roy, B and Meier, W, (eds.) Lecture Notes in Computer Science. (pp. 317 - 331). Springer-Verlag

R

Rother, C.; Kolmogorov, V.; Blake, A.; (2004) "GrabCut": interactive foreground extraction using iterated graph cuts. ACM Transactions on Graphics , 23 (3) pp. 309-314. 10.1145/1015706.1015720.

Z

Zhou, S.; Mondragón , R.J.; (2004) Accurately modeling the internet topology. Physical Review E , 70 (6) 066108-1-066108-8. 10.1103/PhysRevE.70.066108.

Zhou, S.; Mondragon, R.J.; (2004) Accurately modeling the internet topology. Physical Review E , 70 (6) 066108-1-066108-8. 10.1103/PhysRevE.70.066108.

This list was generated on Sun Jul 27 03:07:35 2014 BST.