Elena Pagnin, Gunnar Gunnarsson, Pedram Talebi, Claudio Orlandi and Andrei Sabelfeld
-constrained location queries. In 2016 IEEE Conference on Communications and Network Security, CNS 2016, Philadelphia, PA, USA, October 17-19, 2016 , 2016.
 C. Hazay and Y. Lindell. Efficient secure two-party protocols: Techniques and constructions . Springer Science & Business Media, 2010.
 Y. He, J. Ni, X. Wang, B. Niu, F. Li, and X. Shen. Privacy-preserving partner selection for ride-sharing services. IEEE Trans. Vehicular Technology , 67(7):5994–6005, 2018.
 Y. Huang, D. Evans, and J. Katz. Private set intersection: Are garbled circuits better
Anh Pham, Italo Dacosta, Bastien Jacot-Guillarmod, Kévin Huguenin, Taha Hajar, Florian Tramèr, Virgil Gligor and Jean-Pierre Hubaux
: May 2016.
 http://www.businessinsider.com/blake-jareds-50000-uber-credit-free-rides-for-life-2014-4 . Last visited: May 2016.
 http://fortune.com/2015/03/30/uber-stolen-account-credentials-alphabay/ . Last visited: May 2016.
 Cryptographic key length recommendation. http://www.keylength.com/en/ . Last visited: May 2016.
 G. Arfaoui, J.-F. Lalande, J. Traoré, N. Desmoulins, P. Berthomé, and S. Gharout. A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing. Proc. of the 15th Privacy Enhancing Technologies
Any traveler using a post road—whether an official courier or a private individual—was said to ride post . E.g ., 9 Ann., c. 10 (1711), § 14 (using the term). In the most popular English-language poem of the 1780s, John D. Baird, Cowper , William (1731 - 1800) , poet and letter - writer , O XFORD D ICTIONARY OF N AT ’ L B IOGRAPHY (2004-16) (identifying John Gilpin as “the most popular poem of the decade”), available at http://www.oxforddnb.com.weblib.lib.umt.edu:8080/view/article/6513?docPos=5 . The Diverting History of John Gilpin , William