메뉴 건너뛰기




Volumn , Issue , 2003, Pages 53-59

Leveraging the "Multi" in Secure Multi-Party Computation

Author keywords

Privacy; Secure Distributed Computation; Secure Multi party Computation

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; COMPUTER SIMULATION; FUNCTIONS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; RANDOM PROCESSES; VECTORS;

EID: 1642384656     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1005140.1005149     Document Type: Conference Paper
Times cited : (19)

References (22)
  • 2
    • 0242697120 scopus 로고    scopus 로고
    • Secure multi-party computational geometry
    • Providence, Rhode Island, USA, Aug. 8-10. [Online]
    • M. J. Atallah and W. Du. Secure multi-party computational geometry. In Seventh International Workshop on Algorithms and Data Structures (WADS 2001), Providence, Rhode Island, USA, Aug. 8-10 2001. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/wads2001.ps
    • (2001) Seventh International Workshop on Algorithms and Data Structures (WADS 2001)
    • Atallah, M.J.1    Du, W.2
  • 5
    • 0242612156 scopus 로고    scopus 로고
    • A practical approach to solve secure multi-party computation problems
    • Virginia Beach, virginia, Usa, September 23-26
    • W. Du and Z. Zhan. A practical approach to solve secure multi-party computation problems. In Proceedings of New Security Paradigms Workshop, Virginia Beach, virginia, USA, September 23-26 2002.
    • (2002) Proceedings of New Security Paradigms Workshop
    • Du, W.1    Zhan, Z.2
  • 6
    • 0034820931 scopus 로고    scopus 로고
    • Privacy-preserving cooperative scientific computations
    • Nova Scotia, Canada, June 11-13. [Online]
    • W. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 11-13 2001, pages 273-282. [Online]. Available: http://portal.acm.org
    • (2001) 14th IEEE Computer Security Foundations Workshop , pp. 273-282
    • Du, W.1    Atallah, M.J.2
  • 7
    • 84927517111 scopus 로고    scopus 로고
    • Privacy-preserving statistical analysis
    • New Orleans, Louisiana, USA, December 10-14. [Online]
    • W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14 2001. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/acsac2001.ps
    • (2001) Proceeding of the 17th Annual Computer Security Applications Conference
    • Du, W.1    Atallah, M.J.2
  • 8
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Cloudcroft, New Mexico, USA, September 11-13. [Online]
    • W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, September 11-13 2001, pages 11-20. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/nspw2001.ps
    • (2001) New Security Paradigms Workshop , pp. 11-20
    • Du, W.1    Atallah, M.J.2
  • 9
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • C. Clifton and V. Estivill-Castro, Eds. Maebashi City, Japan: Australian Computer Society, Dec. 9. [Online]
    • W. Du and Z. Zhan. Building decision tree classifier on private data. In IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pages 1-8. [Online]. Available: http://www.jrpit.flinders.edu.au/CRPITVolume14.html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 10
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • [Online]
    • O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In 19th ACM Symposium on the Theory of Computing, 1987, pages 218-229. [Online]. Available: http://doi.acm.org/10.1145/28395.28420
    • (1987) 19th ACM Symposium on the Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0003839182 scopus 로고    scopus 로고
    • Sept., working draft. [Online]
    • O. Goldreich. Secure multi-party computation. Sept. 1998, (working draft). [Online]. Available: http://www.wisdom.weizmann.ac.il/~oded/pp.html
    • (1998) Secure Multi-party Computation
    • Goldreich, O.1
  • 12
    • 84948451182 scopus 로고    scopus 로고
    • A secure protocol for computing dot-products in clustered and distributed environments
    • Vancouver, British Columbia, Aug. 18-21
    • I. Ioannidis, A. Grama, and M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments. In The 2002 International Conference on Parallel Processing, Vancouver, British Columbia, Aug. 18-21 2002.
    • (2002) The 2002 International Conference on Parallel Processing
    • Ioannidis, I.1    Grama, A.2    Atallah, M.3
  • 13
    • 1642335029 scopus 로고    scopus 로고
    • An architecture for privacy-preserving mining of client information
    • C. Clifton and V. Estivill-Castro, Eds. Maebashi City, Japan: Australian Computer Society, Dec. 9. [Online]
    • M. Kantarcioglu and J. Vaidya. An architecture for privacy-preserving mining of client information. In IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pages 37-42. [Online]. Available: http://crpit.com/Vol14.html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 37-42
    • Kantarcioglu, M.1    Vaidya, J.2
  • 14
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • to appear
    • M. Kantarcioǧlu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge Data Eng., to appear.
    • IEEE Trans. Knowledge Data Eng.
    • Kantarcioǧlu, M.1    Clifton, C.2
  • 15
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag, Aug. 20-24. [Online]
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000. Springer-Verlag, Aug. 20-24 2000, pages 36-54. [Online]. Available: http://link.springer.de/link/service/series/0558/bibs/1880/18800036.htm
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 16
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • Heraklion, Crete, Greece, July 6-8. [Online]
    • M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, Heraklion, Crete, Greece, July 6-8 2001. [Online]. Available: http://doi.acm.org/10.1145/380752.380855
    • (2001) Proceedings of the 33rd Annual ACM Symposium on Theory of Computing
    • Naor, M.1    Nissim, K.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • [Online]
    • R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978. [Online]. Available: http://doi.acm.org/10.1145/359340.359342
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 20
    • 0242709355 scopus 로고    scopus 로고
    • Privacy preserving association rule mining in vertically partitioned data
    • Edmonton, Alberta, Canada, July 23-26. [Online].
    • J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26 2002, pages 639-644. [Online]. Available: http://doi.acm.org/10.1145/775047.775142
    • (2002) The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 639-644
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.