Azogagh S, Delfour V, Gambs S and Killijian M. PROBONITE. Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. (23-33).
Waye L, Buiras P, Arden O, Russo A and Chong S. Cryptographically Secure Information Flow Control on Key-Value Stores. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. (1893-1907).
San I, At N, Yakut I and Polat H.
(2016). Efficient paillier cryptoprocessor for privacy-preserving data mining. Security and Communication Networks. 9:11. (1535-1546). Online publication date: 25-Jul-2016.
Gupta T, Crooks N, Mulhern W, Setty S, Alvisi L and Walfish M. Scalable and private media consumption with Popcorn. Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. (91-107).
Williams P and Sion R. Single round access privacy on outsourced storage. Proceedings of the 2012 ACM conference on Computer and communications security. (293-304).
Khoshgozaran A and Shahabi C.
(2010). A taxonomy of approaches to preserve location privacy in location-based services. International Journal of Computational Science and Engineering. 5:2. (86-96). Online publication date: 1-Nov-2010.
Tang M and Fidge C. Reconstruction of falsified computer logs for digital forensics investigations. Proceedings of the Eighth Australasian Conference on Information Security - Volume 105. (12-21).
Wang P, Wang H and Pieprzyk J. Secure coprocessor-based private information retrieval without periodical preprocessing. Proceedings of the Eighth Australasian Conference on Information Security - Volume 105. (5-11).
Yang Y, Ding X, Deng R and Bao F. An Efficient PIR Construction Using Trusted Hardware. Proceedings of the 11th international conference on Information Security. (64-79).
Lin P and Candan K.
(2007). Enabling access-privacy for random walk based data analysis applications. Data & Knowledge Engineering. 63:3. (667-683). Online publication date: 1-Dec-2007.
Yang Y, Li Y and Deng R. New paradigm of inference control with trusted computing. Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security. (243-258).
Wang S, Ding X, Deng R and Bao F. Private information retrieval using trusted hardware. Proceedings of the 11th European conference on Research in Computer Security. (49-64).
Dang T. Privacy-Preserving search and updates for outsourced tree-structured data on untrusted servers. Proceedings of the Third international conference on Trust Management. (338-354).
Iliev A and Smith S.
(2005). Protecting Client Privacy with Trusted Computing at the Server. IEEE Security and Privacy. 3:2. (20-28). Online publication date: 1-Mar-2005.
Smith S.
(2004). Outbound authentication for programmable secure coprocessors. International Journal of Information Security. 3:1. (28-41). Online publication date: 1-Oct-2004.
Aïmeur E, Brassard G and Mani Onana F. Blind sales in electronic commerce. Proceedings of the 6th international conference on Electronic commerce. (148-157).
Smith S. Outbound Authentication for Programmable Secure Coprocessors. Proceedings of the 7th European Symposium on Research in Computer Security. (72-89).
Kesdogan D, Borning M and Schmeink M. Unobservable surfing on the world wide web. Proceedings of the 2nd international conference on Privacy enhancing technologies. (224-238).
Asonov D and Freytag J. Almost optimal private information retrieval. Proceedings of the 2nd international conference on Privacy enhancing technologies. (209-223).
Iliev A and Smith S. Prototyping an armored data vault rights management on Big Brother's computer. Proceedings of the 2nd international conference on Privacy enhancing technologies. (144-159).
Lindemann M and Smith S. Improving DES coprocessor throughput for short operations. Proceedings of the 10th conference on USENIX Security Symposium - Volume 10.