1. From mental poker to core business: why and how to deploy secure computation protocols?;Yung,2015
2. Privacy-preserving relationship path discovery in social networks;Mezzour;CANS,2009
3. Practical private set intersection protocols with linear complexity;Cristofaro;Financ. Cryptogr. Data Secur.,2010
4. S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, N. Borisov, Botgrep: Finding p2p bots with structured graph analysis, in: USENIX Conference on Security, 2010, pp. 95–110.
5. Location privacy via private proximity testing;Narayanan;NDSS,2011