메뉴 건너뛰기




Volumn , Issue , 2006, Pages 927-931

Secure dot-product protocol using trace functions

Author keywords

[No Author keywords available]

Indexed keywords

DOT-PRODUCT PROTOCOL; TRACE FUNCTIONS;

EID: 39049125653     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2006.261795     Document Type: Conference Paper
Times cited : (7)

References (14)
  • 4
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Christian Cachin and Jan Camenisch, editors, Advances in Cryptology- EUROCRYPT, of, Springer-Verlag, May
    • Michael J. Freedman, Kobbi Nissim, and Benny Pinkas, Efficient private matching and set intersection, In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology- EUROCRYPT 2004, Volume 3027 of Lecture Notes in Computer Science, pages 1-19, Springer-Verlag, May 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 5
    • 84974577749 scopus 로고    scopus 로고
    • One-round secure computation and secure autonomous mobile agents
    • Jose P. Rolim Ugo Montanari and Emo Welzl, editors, the 27th International Colloquium on Automata, Languages and Programming ICALP, of, Springer-Verlag
    • J. Kilian, C. Cachin, J. Camenisch and J. Muller, One-round secure computation and secure autonomous mobile agents In Jose P. Rolim Ugo Montanari and Emo Welzl, editors, the 27th International Colloquium on Automata, Languages and Programming (ICALP), Volume 1853 of Lecture Notes in Computer Science, Pages 512-523, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1853 , pp. 512-523
    • Kilian, J.1    Cachin, C.2    Camenisch, J.3    Muller, J.4
  • 6
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas, Privacy preserving data mining, In Journal of Cryptology, Volume 15, Number 3, Pages 177-206, 2002.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 7
    • 24944523186 scopus 로고    scopus 로고
    • On secure scalar product computation for privacy-preserving data mining
    • Choonsik Park and Seongtaek Chee, editors, In the Proceeding of the Seventh Annual International Conference in Information Security and Cryptology ICISC, of, Springer- Verlag, December
    • Helger Lipmaa, Bart Goethals, Sven Laur and Taneli Mielikainen, On secure scalar product computation for privacy-preserving data mining, In Choonsik Park and Seongtaek Chee, editors, In the Proceeding of the Seventh Annual International Conference in Information Security and Cryptology (ICISC 2004), Volume 3506 of Lecture Notes in Computer Science, pages 104-120, Springer- Verlag, December 2004.
    • (2004) Lecture Notes in Computer Science , vol.3506 , pp. 104-120
    • Lipmaa, H.1    Goethals, B.2    Laur, S.3    Mielikainen, T.4
  • 8
    • 0004127220 scopus 로고    scopus 로고
    • Cambridge University Press, New York
    • Rudolf Lidl and Harald Niederreiter, Finite Fields, Volume 20, Cambridge University Press, New York, 1997.
    • (1997) Finite Fields , vol.20
    • Lidl, R.1    Niederreiter, H.2
  • 10
    • 1142282727 scopus 로고    scopus 로고
    • B. Pareneel, J. Claessens and J. Vandewalle, (How) can mobile agents do secure electronic transactions on un-trusted hosts? a survey of the security issues and the current solutions, In ACM transactions on internet technology, 3, pages 28-48, February 2003.
    • B. Pareneel, J. Claessens and J. Vandewalle, (How) can mobile agents do secure electronic transactions on un-trusted hosts? a survey of the security issues and the current solutions, In ACM transactions on internet technology, Volume 3, pages 28-48, February 2003.
  • 11
    • 84959058818 scopus 로고    scopus 로고
    • T. Sander, J. Feigenbaum, M. J. Freedman and A. Shostack, Privacy engineering for digital rights management systems, In T. Sander, editor, Digital Right Management 2001 (DRM 2001), 2320 of Lecture Notes in Computer Science, Pages 76-105, Springer-Verlag, 2002.
    • T. Sander, J. Feigenbaum, M. J. Freedman and A. Shostack, Privacy engineering for digital rights management systems, In T. Sander, editor, Digital Right Management 2001 (DRM 2001), Volume 2320 of Lecture Notes in Computer Science, Pages 76-105, Springer-Verlag, 2002.
  • 12
    • 84947772655 scopus 로고    scopus 로고
    • A new and efficient all-or-nothing disclosure of secrets protocol
    • K. Ohta and D. Pei, editors, Advances in Cryptology- ASIACRYPT'98, of, Springer-Verlag, October
    • J. P. Stern, A new and efficient all-or-nothing disclosure of secrets protocol, In K. Ohta and D. Pei, editors, Advances in Cryptology- ASIACRYPT'98, Volume 1514 of Lecture Notes in Computer Science, Pages 357-371, Springer-Verlag, October 1998.
    • (1998) Lecture Notes in Computer Science , vol.1514 , pp. 357-371
    • Stern, J.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.