1. Two factor authentication using mobile phones;Aloul,2009
2. Privacy-preserving weighted slope one predictor for item-based collaborative filtering;Basu,2011
3. Practical multi-candidate election system;Baudron,2001
4. Order-preserving symmetric encryption;Boldyreva,2009
5. Order-preserving encryption revisited: improved security analysis and alternative solutions;Boldyreva,2011