메뉴 건너뛰기




Volumn 20, Issue 2, 2005, Pages 258-263

Secure two-party computational geometry

Author keywords

Millionaire problem; Oblivious transfer; Protocol; Secure computation geometry; Secure multi party computation

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER SIMULATION; CRYPTOGRAPHY; INTERNET; NETWORK PROTOCOLS; PROBLEM SOLVING; STATISTICAL METHODS; THEOREM PROVING;

EID: 18244384471     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-005-0258-z     Document Type: Conference Paper
Times cited : (62)

References (16)
  • 1
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • September 11-13, Cloudcroft, New Mexico, USA.
    • Wenliang Du, Mikhail J Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigma Workshop 2001, September 11-13, 2001, Cloudcroft, New Mexico, USA., pp.11-20. Available at http://www.cis.syr.edu/wedu/Research/publication.html
    • (2001) New Security Paradigma Workshop 2001 , pp. 11-20
    • Du, W.1    Atallah, M.J.2
  • 6
    • 4544235438 scopus 로고    scopus 로고
    • Parallel coin-tossing and constant-round secure two-party computation
    • Lindeil Y. Parallel coin-tossing and constant-round secure two-party computation. Journal of Cryptology, 2003, 16(3): 143-184.
    • (2003) Journal of Cryptology , vol.16 , Issue.3 , pp. 143-184
    • Lindeil, Y.1
  • 8
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell Y, Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 10
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Ronald Fagin, Moni Naor, Peter Einkler. Comparing information without leaking it. Communications of the ACM, 1996, 39(5): 77-85.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Einkler, P.3
  • 12
    • 0034820931 scopus 로고    scopus 로고
    • Privacy-preserving cooperative scientific computation
    • IEEE Computer Society Press, Los Alamitos, CA.
    • Wenliang Du, Mikhail J Atallah. Privacy-preserving cooperative scientific computation. In Proc. 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos, CA., 2001, pp.273-282.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 273-282
    • Du, W.1    Atallah, M.J.2
  • 13
    • 77951955873 scopus 로고    scopus 로고
    • Protocol for secure remote database access with approximate matching
    • The First Workshop on Security and Privacy in E-Commerce, ACM Press, New York
    • Wenliang Du, Mikhail J Atallah. Protocol for secure remote database access with approximate matching. In 7th ACM Conference on Computer and Communication Security, The First Workshop on Security and Privacy in E-Commerce, ACM Press, New York, available at http://www.cis.syr.edu/wedu/ Research/publication.html
    • 7th ACM Conference on Computer and Communication Security
    • Du, W.1    Atallah, M.J.2
  • 15
    • 84888252697 scopus 로고
    • All-or-nothing disclosure of secret. Advance in cryptology-Crypto86
    • Springer-Verlag, Berlin
    • Brassard G, Crepeau C, Robert J. All-or-nothing disclosure of secret. Advance in Cryptology-Crypto86, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1987, pp.234-238.
    • (1987) Lecture Notes in Computer Science , pp. 234-238
    • Brassard, G.1    Crepeau, C.2    Robert, J.3
  • 16
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
    • Wen-Guey Tzeng. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Transactions on Computers, 2004, 53(2): 232-240.
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.-G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.