-
2
-
-
35048875418
-
Secure computation of the kth-ranked element
-
[AMP04] volume 3027 of LNCS, Springer-Verlag
-
[AMP04] G. Aggarwal, N. Mishra and B. Pinkas Secure computation of the kth-ranked element. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 40-55. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 40-55
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
4
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
[CIK+01] ACM Press
-
[CIK+01] R. Canetti, Y. Ishai, R. Kumar, M. Reiter, R. Rubinfeld and R. Wright Selective private function evaluation with applications to private statistics. In Proc. of the 20th Annual ACM Symposium on Principles of Distributed Computing, pages 293-304. ACM Press, 2001.
-
(2001)
Proc. of the 20th Annual ACM Symposium on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
8
-
-
84879521412
-
Secure multiparty computation of approximations
-
[FIM+01] Springer-Verlag
-
[FIM+01] J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss and R. N. Wright Secure multiparty computation of approximations. In Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 927-938. Springer-Verlag, 2001.
-
(2001)
Proc. of the 28th International Colloquium on Automata, Languages and Programming
, pp. 927-938
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.N.6
-
9
-
-
35048820609
-
Efficient private matching and set intersection
-
[FNP04] volume 3027 of LNCS, Springer-Verlag
-
[FNP04] M. Freedman, K. Nissim and B. Pinkas Efficient private matching and set intersection. In Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 1-19. Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
10
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
[GLLM04] Proc. of the Seventh Annual International Conference in Information Security and Cryptology, Springer-Verlag
-
[GLLM04] B. Goethals, S. Laur, H. Lipmaa and T. Mielikäine On private scalar product computation for privacy-preserving data mining. In Proc. of the Seventh Annual International Conference in Information Security and Cryptology, vol. 3506 of LNCS, pp. 104-120. Springer-Verlag.
-
LNCS
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäine, T.4
-
13
-
-
19544378656
-
Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data
-
[LKR03] Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County
-
[LKR03] K. Liu, H. Kargupta and J. Ryan Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data. Technical Report TR-CS-03-24, Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County, 2003.
-
(2003)
Technical Report
, vol.TR-CS-03-24
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
14
-
-
33746437508
-
Privacy preserving data mining
-
[LP02]
-
[LP02] Y. Lindell and B. Pinkas Privacy preserving data mining. J. Cryptology, 15(3): 177-206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
17
-
-
84942550998
-
Public-key cryptosystems based on composite degree residue classes
-
[Pai99] volume 1592 of LNCS
-
[Pai99] P. Paillier Public-key cryptosystems based on composite degree residue classes. In Advances in Cryptology - EUROCRYPT 99, volume 1592 of LNCS, pages 223-238, 1999.
-
(1999)
Advances in Cryptology - EUROCRYPT 99
, pp. 223-238
-
-
Paillier, P.1
|