-
1
-
-
0242612156
-
A practical approach to solve secure multiparty computation problems
-
Virginia Beach, USA, September 23-26
-
Du W, Zhan Z. A practical approach to solve secure multiparty computation problems. In New Security Paradigms Workshop 2002, Virginia Beach, USA, September 23-26, 2002, pp.127-135.
-
(2002)
New Security Paradigms Workshop 2002
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
2
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
New Mexico, USA, September 11-13
-
Du W, Atallah M J. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 11-13, 2001, pp.11-20.
-
(2001)
New Security Paradigms Workshop 2001, Cloudcroft
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
3
-
-
22844438241
-
An algorithm for privacy-preserving Boolean association rule mining
-
Luo Y L, Huang L S et al. An algorithm for privacy-preserving Boolean association rule mining. Acta Electronica Sinica, 2005, 33(5): 900-903.
-
(2005)
Acta Electronica Sinica
, vol.33
, Issue.5
, pp. 900-903
-
-
Luo, Y.L.1
Huang, L.S.2
-
4
-
-
33744743349
-
Privacy protection in the relative position determination for two spatial geometric objects
-
Luo Y L, Huang L S et al. Privacy protection in the relative position determination for two spatial geometric objects. Journal of Computer Research and Development, 2006, 43(3): 410-416.
-
(2006)
Journal of Computer Research and Development
, vol.43
, Issue.3
, pp. 410-416
-
-
Luo, Y.L.1
Huang, L.S.2
-
5
-
-
33646505576
-
Privacy-preserving distance measurement and its applications
-
Luo Y L, Huang L S et al. Privacy-preserving distance measurement and its applications. Chinese Journal of Electronica, 2006, 15(2): 237-241.
-
(2006)
Chinese Journal of Electronica
, vol.15
, Issue.2
, pp. 237-241
-
-
Luo, Y.L.1
Huang, L.S.2
-
6
-
-
84958035648
-
Secure multi-party computational geometry
-
Proc. 7th International Workshop on Algorithms and Data Structures WADS 2001, Springer Verlag
-
Atallah M J, Du W. Secure multi-party computational geometry. In Proc. 7th International Workshop on Algorithms and Data Structures (WADS 2001), Lecture Notes in Computer Science 8125, Springer Verlag, 2001, pp.165-179.
-
(2001)
Lecture Notes in Computer Science
, vol.8125
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
8
-
-
1342345050
-
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
-
Tzeng W G. Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Transactions on Computers, 2004, 53(2): 232-240.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.G.1
-
9
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in CryptologyEUROCRYPT'99, Springer-Verlag
-
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In Advances in CryptologyEUROCRYPT'99, Lecture Notes in Computer Science 1592, Springer-Verlag, 1999, pp.223-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
11
-
-
0032218237
-
-
Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In Proc. the 5th ACM Conf. Computer and Communications Security, San Francisco: ACM, 1998, pp.59-66.
-
Naccache D, Stern J. A new public-key cryptosystem based on higher residues. In Proc. the 5th ACM Conf. Computer and Communications Security, San Francisco: ACM, 1998, pp.59-66.
-
-
-
-
13
-
-
0033280866
-
Efficient private bidding and auctions with an oblivious third party
-
Singapore
-
Cachin C. Efficient private bidding and auctions with an oblivious third party. In Proc. the 6th ACM Conf. Computer and Communications Security, Singapore, 1999, pp.120-127.
-
(1999)
Proc. the 6th ACM Conf. Computer and Communications Security
, pp. 120-127
-
-
Cachin, C.1
-
16
-
-
35048846561
-
Strong condition oblivious transfer and computing on intervals
-
Proc. Advances in Cryptology, ASIACRYPT'04, Jeju Island, Korea
-
Blake I F, Kolesnikov V. Strong condition oblivious transfer and computing on intervals. In Proc. Advances in Cryptology - ASIACRYPT'04, LNCS 3329, Jeju Island, Korea, 2004, pp.515-529.
-
(2004)
LNCS
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
17
-
-
26444581774
-
An efficient solution to the millionaires' problem based on hormomorphic encryption
-
Springer-Verlag
-
Lin H Y, Tzeng W G. An efficient solution to the millionaires' problem based on hormomorphic encryption. Lecture notes in Computer Science 3531, Springer-Verlag, 2005, pp.456-466.
-
(2005)
Lecture notes in Computer Science
, vol.3531
, pp. 456-466
-
-
Lin, H.Y.1
Tzeng, W.G.2
-
19
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
The 7th Annual Int. Conf. Information Security and Cryptology (ICISC 2004, Choonsik Park, Seongtaek Chee eds, Springer-Verlag, Seoul, Korea, Dec
-
Goethals B, Laur S, Lipmaa H, Mielikäinen T. On secure scalar product computation for privacy-preserving data mining. In The 7th Annual Int. Conf. Information Security and Cryptology (ICISC 2004), Choonsik Park, Seongtaek Chee (eds.), LNCS 3506, Springer-Verlag, Seoul, Korea, Dec. 2004, pp. 104-120.
-
(2004)
LNCS
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
20
-
-
33847048346
-
A faster algorithm of modular exponentiation in RSA
-
Luo Yonglong, Huang Liusheng et al. A faster algorithm of modular exponentiation in RSA. Chinese Journal of Mini-Micro Systems, 2004, 25(1): 76-78.
-
(2004)
Chinese Journal of Mini-Micro Systems
, vol.25
, Issue.1
, pp. 76-78
-
-
Yonglong, L.1
Liusheng, H.2
|