메뉴 건너뛰기




Volumn 30, Issue 2, 2007, Pages 248-254

Privacy-preserving cross product protocol and its applications

Author keywords

Computational geometry; Cross product; Protocol; Secure multi party computation

Indexed keywords

ALGORITHMS; COMPUTATIONAL GEOMETRY; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 34147194714     PISSN: 02544164     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (26)

References (19)
  • 7
    • 33744743349 scopus 로고    scopus 로고
    • Privacy protection in the relative position determination for two spatial geometric objects
    • Chinese source
    • Luo Yong-Long, Huang Liu-Sheng et al. Privacy protection in the relative position determination for two spatial geometric objects. Chinese Journal of Computer Research and Development, 2006, 43(3): 410-416 (in Chinese)
    • (2006) Chinese Journal of Computer Research and Development , vol.43 , Issue.3 , pp. 410-416
    • Luo, Y.-L.1    Huang, L.-S.2
  • 8
    • 33646505576 scopus 로고    scopus 로고
    • Privacy-preserving distance measurement and its applications
    • Luo Yong-Long, Huang Liu-Sheng et al. Privacy-preserving distance measurement and its applications. Chinese Journal of Electronics. 2006, 15(2): 237-241
    • (2006) Chinese Journal of Electronics , vol.15 , Issue.2 , pp. 237-241
    • Luo, Y.-L.1    Huang, L.-S.2
  • 9
    • 33750899149 scopus 로고    scopus 로고
    • A secure protocol for determining whether a point is inside a convex polygon
    • Luo Yong-Long, Huang Liu-Sheng et al. A secure protocol for determining whether a point is inside a convex polygon. Chinese Journal of Electronics, 2006, 15(4): 578-582
    • (2006) Chinese Journal of Electronics , vol.15 , Issue.4 , pp. 578-582
    • Luo, Y.-L.1    Huang, L.-S.2
  • 12
    • 0242697123 scopus 로고    scopus 로고
    • A study of several specific secure two-party computation problem
    • USA: Purdue University
    • Du W L. A study of several specific secure two-party computation problem [Ph. D. dissertation]. USA: Purdue University, 2001
    • (2001)
    • Du, W.L.1
  • 16
    • 2942748384 scopus 로고    scopus 로고
    • A protocol of comparing information without leaking
    • Chinese source
    • Qin Jing, Zhang Zhen-Feng, Feng Deng-Guo, Li Bao. A protocol of comparing information without leaking. Journal of Software, 2004, 15(3): 421-427 (in Chinese)
    • (2004) Journal of Software , vol.15 , Issue.3 , pp. 421-427
    • Qin, J.1    Zhang, Z.-F.2    Feng, D.-G.3    Li, B.4
  • 17
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • Kantarcioglu M, Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(9): 1026-1037
    • (2004) IEEE Transactions on Knowledge and Data Engineering , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 18
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • Lake Buena Vista, Florida
    • Du W L, Han Y S, Chen S G. Privacy-preserving multivariate statistical analysis: Linear regression and classification//Proceedings of the 4th SIAM International Conference on Data Mining. Lake Buena Vista, Florida, 2004: 222-233
    • (2004) Proceedings of the 4th SIAM International Conference on Data Mining , pp. 222-233
    • Du, W.L.1    Han, Y.S.2    Chen, S.G.3
  • 19
    • 22844438241 scopus 로고    scopus 로고
    • An algorithm for privacy-preserving Boolean association rule mining
    • Chinese source
    • Luo Yong-Long, Huang Liu-Sheng et al. An algorithm for privacy-preserving Boolean association rule mining. Acta Electronica Sinica, 2005, 33(5): 900-903 (in Chinese)
    • (2005) Acta Electronica Sinica , vol.33 , Issue.5 , pp. 900-903
    • Luo, Y.-L.1    Huang, L.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.