-
1
-
-
0020312165
-
Protocols for secure computations
-
Chicago, IL, USA, pp
-
A.C. Yao, "Protocols for secure computations", Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science, Chicago, IL, USA, pp. 160-164, 1982.
-
(1982)
Proc. of the 23rd Annual IEEE Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
-
2
-
-
0242697123
-
A study of several specific secure two-party computation problems
-
Ph.D. Thesis, Purdue University, West Lafayette, Indiana, USA
-
W. Du, "A study of several specific secure two-party computation problems", Ph.D. Thesis, Purdue University, West Lafayette, Indiana, USA, 2001.
-
(2001)
-
-
Du, W.1
-
3
-
-
0030689525
-
Multi-party computations: Past and present
-
Santa Barbara, CA, USA, pp
-
S. Goldwasser, "Multi-party computations: past and present", Proc. of the 16th Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, CA, USA, pp. 1-6, 1997.
-
(1997)
Proc. of the 16th Annual ACM Symposium on Principles of Distributed Computing
, pp. 1-6
-
-
Goldwasser, S.1
-
4
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
Atlanta, GA, USA, pp
-
M. Naor and B. Pinkas, "Oblivious transfer and polynomial evaluation", Proc. of the 31th ACM Symposium on Theory of Computing, Atlanta, GA, USA, pp.245-254, 1999.
-
(1999)
Proc. of the 31th ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
5
-
-
4544312695
-
Cryptographic techniques for privacy-preserving data mining
-
B. Pinkas, "Cryptographic techniques for privacy-preserving data mining", ACM SIGKDD Explorations Newsletter, Vol.4, No.2, pp.12-19, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 12-19
-
-
Pinkas, B.1
-
6
-
-
85084163840
-
Fairplay-a secure two-party computation system
-
San Diego, CA, pp
-
D. Malkhi, N. Nisan, B. Pinkas and Y. Sella, "Fairplay-a secure two-party computation system", Proc. of the 13th Usenix Security Symposium, San Diego, CA, pp.287-302, 2004.
-
(2004)
Proc. of the 13th Usenix Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
7
-
-
24144488603
-
Keyword search and oblivious pseudorandom functions
-
Proc. of the 2nd Theory of Cryptography Conference TCC'05, Springer-Verlag, Cambridge, MA, pp
-
M. Freedman, Y. Ishai, B. Pinkas and O. Reingold, "Keyword search and oblivious pseudorandom functions", Proc. of the 2nd Theory of Cryptography Conference (TCC'05), LNCS 3378, Springer-Verlag, Cambridge, MA, pp.303-324, 2005.
-
(2005)
LNCS
, vol.3378
, pp. 303-324
-
-
Freedman, M.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
8
-
-
33645606050
-
Privacy-preserving data mining over vertically partitioned data
-
Ph.D. Thesis, Purdue University, West Lafayette, Indiana, USA
-
J. Vaidya, "Privacy-preserving data mining over vertically partitioned data", Ph.D. Thesis, Purdue University, West Lafayette, Indiana, USA, 2004.
-
(2004)
-
-
Vaidya, J.1
-
9
-
-
84974555530
-
Privacy 'preserving data mining
-
Proc. of Advances in Cryptology-CRYPTO 2000, Springer-Verlag, Santa Barbara, California, USA, pp
-
Y. Lindell and B. Pinkas, "Privacy 'preserving data mining", Proc. of Advances in Cryptology-CRYPTO 2000, LNCS 1880, Springer-Verlag, Santa Barbara, California, USA, pp.36-54, 2000.
-
(2000)
LNCS
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
10
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
Proc. of the 7th Annual International Conf. in Information Security and Cryptology ICISC'04, Springer-Verlag, Seoul, Korea, pp
-
B. Goethals, S. Laur, H. Lipmaa and T. Mielikainen, "On secure scalar product computation for privacy-preserving data mining" , Proc. of the 7th Annual International Conf. in Information Security and Cryptology (ICISC'04), LNCS 3506, Springer-Verlag, Seoul, Korea, pp.104-120, 2004.
-
(2004)
LNCS
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
11
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Proc. of Advances in Cryptology-EUROCRYPT'98, Springer-Verlag, Espoo, Finland, pp
-
T. Okamoto and S. Uchiyama, "A new public-key cryptosystem as secure as factoring", Proc. of Advances in Cryptology-EUROCRYPT'98, LNCS 1403, Springer-Verlag, Espoo, Finland, pp.308-318, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
12
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Proc. of Advances in Cryptology-EUROCRYPT'99, Springer-Verlag, Prague, Czech Republic, pp
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes", Proc. of Advances in Cryptology-EUROCRYPT'99, LNCS 1592, Springer-Verlag, Prague, Czech Republic, pp.223-238, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
14
-
-
23844556499
-
Oblivious polynomial evaluation and oblivious neural learning
-
Y. Chang and C. Lu, "Oblivious polynomial evaluation and oblivious neural learning", Theoretical Computer Science, Vol.341, No.1-3, pp.39-54, 2005.
-
(2005)
Theoretical Computer Science
, vol.341
, Issue.1-3
, pp. 39-54
-
-
Chang, Y.1
Lu, C.2
-
15
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, X. Lin, J. Vaidya and M. Zhu, "Tools for privacy preserving distributed data mining", ACM SIGKDD Explorations Newsletter, Vol.4, No.2, pp.28-34, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Lin, X.3
Vaidya, J.4
Zhu, M.5
-
16
-
-
84948451182
-
A secure protocol for computing dot products in clustered and distributed environments
-
Vancouver, Canada, pp
-
I. Ioannidis, A. Grama and M. Atallah, "A secure protocol for computing dot products in clustered and distributed environments", Proc. of the 31st International Conference on Parallel Processing (ICPP'08), Vancouver, Canada, pp.379-384, 2002.
-
(2002)
Proc. of the 31st International Conference on Parallel Processing (ICPP'08)
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
17
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada, pp
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data", Proc. of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp.639-644, 2002.
-
(2002)
Proc. of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
18
-
-
33646505576
-
Privacy-preserving distance measurement and its applications
-
Y. Luo, L. Huang, G. Chen and H. Shen, "Privacy-preserving distance measurement and its applications", Chinese Journal of Electronics, Vol.15, No.2, pp.237-241, 2006.
-
(2006)
Chinese Journal of Electronics
, vol.15
, Issue.2
, pp. 237-241
-
-
Luo, Y.1
Huang, L.2
Chen, G.3
Shen, H.4
-
19
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich and A. Lempel, "A randomized protocol for signing contracts", Communications of the ACM, Vol.28, No.6, pp.637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
20
-
-
0022882770
-
How to generate and exchange secrets
-
Toronto, Ont, Canada, pp
-
A.C. Yao, "How to generate and exchange secrets", Proc. of the 27th IEEE Symposium on Foundations of Computer Science, Toronto, Ont, Canada, pp. 162-167, 1986.
-
(1986)
Proc. of the 27th IEEE Symposium on Foundations of Computer Science
, pp. 162-167
-
-
Yao, A.C.1
|