A. Ben-David, N. Nisan, and B. Pinkas. Proceedings of the 15th ACM Conference on Computer and Communications
Security, page 257--266. New York, NY, USA, ACM, (2008)
W. Dangelmaier, J. Heidenreich, and U. Pape. Proceedings of the 2005 IEEE International Conference on e-Technology,
e-Commerce and e-Service (EEE'05) on e-Technology, e-Commerce and
e-Service, page 309--314. Washington, DC, USA, IEEE Computer Society, (2005)
K. Deb, S. Agrawal, A. Pratap, and T. Meyarivan. Proceedings of the 6th International Conference on Parallel Problem
Solving from Nature, volume 1917 of Lecture Notes in Computer Science, Berlin, Heidelberg, Springer, (September 2000)
C. Fonseca, and P. Fleming. Proceedings of the 5th International Conference on Genetic Algorithms, page 416--423. San Francisco, CA, USA, Morgan Kaufmann Publishers Inc., (1993)
S. Jha, L. Kruger, and V. Shmatikov. Proceedings of the 2008 IEEE Symposium on Security and Privacy, page 216--230. Washington, DC, USA, IEEE Computer Society, (2008)
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Proceedings of the 13th USENIX Security Symposium, page 287--302. Berkeley, CA, USA, USENIX Association, (2004)
M. Naor, and B. Pinkas. SODA '01: Proceedings of the twelfth annual ACM-SIAM symposium on
Discrete algorithms, page 448--457. Philadelphia, PA, USA, Society for Industrial and Applied Mathematics, (2001)
G. Rudolph. Proceedings of the International Symposium on Information Science
Innovations in Engineering of Natural and Artificial Intelligent
Systems (ISI 2001), page 818-822. Millet, AB, CA, ICSC Academic Press, (2001)
W. Tzeng. PKC '02: Proceedings of the 5th International Workshop on Practice
and Theory in Public Key Cryptosystems, volume 2274 of Lecture Notes in Computer Science, page 159--171. London, UK, Springer, (2002)