D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
G. Rudolph. Proceedings of the International Symposium on Information Science
Innovations in Engineering of Natural and Artificial Intelligent
Systems (ISI 2001), page 818-822. Millet, AB, CA, ICSC Academic Press, (2001)
C. Fonseca, and P. Fleming. Proceedings of the 5th International Conference on Genetic Algorithms, page 416--423. San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., (1993)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
A. Ben-David, N. Nisan, and B. Pinkas. Proceedings of the 15th ACM Conference on Computer and Communications
Security, page 257--266. New York, NY, USA, ACM, (2008)
W. Tzeng. PKC '02: Proceedings of the 5th International Workshop on Practice
and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, page 159--171. London, UK, Springer, (2002)
K. Deb, S. Agrawal, A. Pratap, and T. Meyarivan. Proceedings of the 6th International Conference on Parallel Problem
Solving from Nature, volume 1917 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, (September 2000)