31![Errata for “Crowdsourcing Algorithms for Entity Resolution Errata for “Crowdsourcing Algorithms for Entity Resolution](https://www.pdfsearch.io/img/b1cc2ad2fb9b4b05d50e7bf80ac80973.jpg) | Add to Reading ListSource URL: www.vldb.orgLanguage: English - Date: 2014-12-17 10:07:28
|
---|
32![Bibliography [1] W. Aiello, M. Bellare and R. Venkatesan. Knowledge on the Average { Perfect, Statistical and Logarithmic. In 27th ACM Symposium on the Theory of Computing, pages 469{478, [removed]W. Aiello and J. Hast Bibliography [1] W. Aiello, M. Bellare and R. Venkatesan. Knowledge on the Average { Perfect, Statistical and Logarithmic. In 27th ACM Symposium on the Theory of Computing, pages 469{478, [removed]W. Aiello and J. Hast](https://www.pdfsearch.io/img/4bc09bbadf48e66ac13f59239cf8484a.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.ilLanguage: English - Date: 2014-06-22 06:25:12
|
---|
33![LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters LOSSY Identity-based (Lossy) Trapdoor Functions and Applications Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters](https://www.pdfsearch.io/img/04f0ea09397602a4db04c51c86291af5.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-21 02:35:56
|
---|
34![DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi DupLESS: Server-Aided Encryption for Deduplicated Storage∗ Mihir Bellare Sriram Keelveedhi](https://www.pdfsearch.io/img/85d7249a3ad317ca8e439359166e28f7.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-07-02 21:51:23
|
---|
35![Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U](https://www.pdfsearch.io/img/80c9cfe945dd8cb43eb0a1a0e55cb051.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:54
|
---|
36![Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed] Provable Security Support for the Skein Hash Family Version 1.0, April 29, 2009 Mihir Bellare University of California San Diego, [removed]](https://www.pdfsearch.io/img/c192261d1e36325e79f8dea2b419fc6d.jpg) | Add to Reading ListSource URL: www.schneier.comLanguage: English - Date: 2014-03-02 23:18:32
|
---|
37![A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗ A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗](https://www.pdfsearch.io/img/3dbe72a22a5fd095d77d173295a20088.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-08-03 22:54:21
|
---|
38![Second Modes of Operation Workshop (August[removed]OCB Modes Second Modes of Operation Workshop (August[removed]OCB Modes](https://www.pdfsearch.io/img/8bbfb026ec267f6832a483c2363f931c.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-12-07 13:09:22
|
---|
39![](https://www.pdfsearch.io/img/53730be69411aa77df6aa7d65c8bd73f.jpg) | Add to Reading ListSource URL: mhrd.gov.inLanguage: English - Date: 2012-02-17 02:50:04
|
---|
40![INVESTIGATION PRICE: Software for the Targeted Assembly of Components of (Meta) Genomic Sequence Data J. Graham Ruby,*,†,1 Priya Bellare,†,‡,2 and Joseph L. DeRisi*,† INVESTIGATION PRICE: Software for the Targeted Assembly of Components of (Meta) Genomic Sequence Data J. Graham Ruby,*,†,1 Priya Bellare,†,‡,2 and Joseph L. DeRisi*,†](https://www.pdfsearch.io/img/cf1bbacd33849bf8e45f60e449b48177.jpg) | Add to Reading ListSource URL: derisilab.ucsf.eduLanguage: English - Date: 2013-10-30 16:40:15
|
---|