-
1
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
September 11-13, Cloudcroft, New Mexico, USA.
-
Wenliang Du, Mikhail J Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigma Workshop 2001, September 11-13, 2001, Cloudcroft, New Mexico, USA., pp.11-20. Available at http://www.cis.syr.edu/wedu/Research/publication.html
-
(2001)
New Security Paradigma Workshop 2001
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
2
-
-
84958035648
-
Secure multi-party computational geometry
-
Springer-Verlag, New York
-
Mikhail J Atallah, Wenliang Du. Secure multi-party computational geometry. In 7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences 2125, Springer-Verlag, New York, 2001, pp.165-179.
-
(2001)
7th Int. Workshop on Algorithms and Data Structures (WADS 2001), Lecture Note in Computer Sciences
, vol.2125
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
4
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York
-
Oded Goldreich, Silvio Micali, Avi Wigderson. How to play any mental game. In Proc. the 19th Annual ACM Confer ence on Theory of Computing, ACM Press, New York, 1987, pp.218-229.
-
(1987)
Proc. the 19th Annual ACM Confer Ence on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
6
-
-
4544235438
-
Parallel coin-tossing and constant-round secure two-party computation
-
Lindeil Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cryptology, 2003, 16(3): 143-184.
-
(2003)
Journal of Cryptology
, vol.16
, Issue.3
, pp. 143-184
-
-
Lindeil, Y.1
-
8
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
10
-
-
0030150177
-
Comparing information without leaking it
-
Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996, 39(5): 77-85.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Einkler, P.3
-
11
-
-
84947284060
-
Secure computation without agreement
-
Springer-Verlag, New York
-
Goldwasser S, Lindell Y. Secure computation without agreement. In Proc. 16th DISC, Lecture Notes in Computer Science 2508, Springer-Verlag, New York, 2002, pp.17-32.
-
(2002)
Proc. 16th DISC, Lecture Notes in Computer Science
, vol.2508
, pp. 17-32
-
-
Goldwasser, S.1
Lindell, Y.2
-
12
-
-
0034820931
-
Privacy-preserving cooperative scientific computation
-
IEEE Computer Society Press, Los Alamitos, CA.
-
Wenliang Du, Mikhail J Atallah. Privacy-preserving cooperative scientific computation. In Proc. 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos, CA., 2001, pp.273-282.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 273-282
-
-
Du, W.1
Atallah, M.J.2
-
13
-
-
77951955873
-
Protocol for secure remote database access with approximate matching
-
The First Workshop on Security and Privacy in E-Commerce, ACM Press, New York
-
Wenliang Du, Mikhail J Atallah. Protocol for secure remote database access with approximate matching. In 7th ACM Conference on Computer and Communication Security, The First Workshop on Security and Privacy in E-Commerce, ACM Press, New York, available at http://www.cis.syr.edu/wedu/ Research/publication.html
-
7th ACM Conference on Computer and Communication Security
-
-
Du, W.1
Atallah, M.J.2
-
15
-
-
84888252697
-
All-or-nothing disclosure of secret. Advance in cryptology-Crypto86
-
Springer-Verlag, Berlin
-
Brassard G, Crepeau C, Robert J. All-or-nothing disclosure of secret. Advance in Cryptology-Crypto86, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1987, pp.234-238.
-
(1987)
Lecture Notes in Computer Science
, pp. 234-238
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.3
-
16
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
-
Wen-Guey Tzeng. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Transactions on Computers, 2004, 53(2): 232-240.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.-G.1
|