Similarity estimation techniques from rounding algorithms, Proceedings of the thiry-fourth annual ACM symposium on Theory of computing , STOC '02, 2002. ,
DOI : 10.1145/509907.509965
Hamming DHT: Taming the similarity search, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.7-12, 2013. ,
DOI : 10.1109/CCNC.2013.6488418
Lecture notes on cryptography, Summers course on cryptography, MIT, pp.136-140, 1996. ,
State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition, 2009 Third International Conference on Network and System Security, pp.373-380, 2009. ,
DOI : 10.1109/NSS.2009.51
Finding near-duplicate web pages, Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval , SIGIR '06, 2006. ,
DOI : 10.1145/1148170.1148222
A Policy Language for Distributed Usage Control, ESORICS, issue.2, pp.531-546, 2007. ,
DOI : 10.1007/978-3-540-74835-9_35
Concurrent Enforcement of Usage Control Policies, 2008 IEEE Workshop on Policies for Distributed Systems and Networks, pp.111-118, 2008. ,
DOI : 10.1109/POLICY.2008.44
A note on the formalisation of UCON, Proceedings of the 12th ACM symposium on Access control models and technologies , SACMAT '07, pp.163-168, 2007. ,
DOI : 10.1145/1266840.1266867
Towards a Usage Control Policy Specification with Petri Nets, pp.905-912, 2009. ,
DOI : 10.1007/978-3-642-05151-7_11
Distributed data usage control for web applications, Proceedings of the first ACM conference on Data and application security and privacy, CODASPY '11, pp.85-96, 2011. ,
DOI : 10.1145/1943513.1943526
Detecting near-duplicates for web crawling, Proceedings of the 16th international conference on World Wide Web , WWW '07, 2007. ,
DOI : 10.1145/1242572.1242592
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2002. ,
DOI : 10.1145/984334.984339
Usage control enforcement with data flow tracking for x11, 5th International Workshop on Security and Trust Management, 2009. ,
Exploiting similarity for multi-source downloads using file handprints, Proceedings of the 4th USENIX conference on Networked systems design & implementation , NSDI'07, pp.2-2, 2007. ,
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960. ,
DOI : 10.1137/0108018
A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2003. ,
DOI : 10.1145/1883612.1883615
Towards a Times-Based Usage Control Model, Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, pp.227-242, 2007. ,
DOI : 10.1145/1108906.1108908