메뉴 건너뛰기




Volumn 21, Issue 1, 2006, Pages 47-52

Experimental analysis of a privacy-preserving scalar product protocol

Author keywords

Data mining; Privacy; Scalar product protocol

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; DATA MINING; INFORMATION DISSEMINATION; NETWORK PROTOCOLS; OPTIMIZATION; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33646358700     PISSN: 02676192     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (24)
  • 2
    • 35048875418 scopus 로고    scopus 로고
    • Secure computation of the kth-ranked element
    • [AMP04] volume 3027 of LNCS, Springer-Verlag
    • [AMP04] G. Aggarwal, N. Mishra and B. Pinkas Secure computation of the kth-ranked element. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 40-55. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 9
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • [FNP04] volume 3027 of LNCS, Springer-Verlag
    • [FNP04] M. Freedman, K. Nissim and B. Pinkas Efficient private matching and set intersection. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 1-19. Springer-Verlag, 2004.
    • (2004) Advances in Cryptology - EUROCRYPT 2004 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 10
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • [GLLM04] Proc. of the Seventh Annual International Conference in Information Security and Cryptology, Springer-Verlag
    • [GLLM04] B. Goethals, S. Laur, H. Lipmaa and T. Mielikäine On private scalar product computation for privacy-preserving data mining. In Proc. of the Seventh Annual International Conference in Information Security and Cryptology, vol. 3506 of LNCS, pp. 104-120. Springer-Verlag.
    • LNCS , vol.3506 , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäine, T.4
  • 13
    • 19544378656 scopus 로고    scopus 로고
    • Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data
    • [LKR03] Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County
    • [LKR03] K. Liu, H. Kargupta and J. Ryan Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data. Technical Report TR-CS-03-24, Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, 2003.
    • (2003) Technical Report , vol.TR-CS-03-24
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 14
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • [LP02]
    • [LP02] Y. Lindell and B. Pinkas Privacy preserving data mining. J. Cryptology, 15(3): 177-206, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 17
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residue classes
    • [Pai99] volume 1592 of LNCS
    • [Pai99] P. Paillier Public-key cryptosystems based on composite degree residue classes. In Advances in Cryptology - EUROCRYPT 99, volume 1592 of LNCS, pages 223-238, 1999.
    • (1999) Advances in Cryptology - EUROCRYPT 99 , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.