-
3
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
Neal Koblitz, editor, ACM Press
-
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright, Selective private function evaluation with applications to private statistics, In Neal Koblitz, editor, the 20th ACM Symposium on Principles of Distributed Computing (PODC), Pages 293-304, ACM Press, 2001.
-
(2001)
the 20th ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
4
-
-
35048820609
-
Efficient private matching and set intersection
-
Christian Cachin and Jan Camenisch, editors, Advances in Cryptology- EUROCRYPT, of, Springer-Verlag, May
-
Michael J. Freedman, Kobbi Nissim, and Benny Pinkas, Efficient private matching and set intersection, In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology- EUROCRYPT 2004, Volume 3027 of Lecture Notes in Computer Science, pages 1-19, Springer-Verlag, May 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
5
-
-
84974577749
-
One-round secure computation and secure autonomous mobile agents
-
Jose P. Rolim Ugo Montanari and Emo Welzl, editors, the 27th International Colloquium on Automata, Languages and Programming ICALP, of, Springer-Verlag
-
J. Kilian, C. Cachin, J. Camenisch and J. Muller, One-round secure computation and secure autonomous mobile agents In Jose P. Rolim Ugo Montanari and Emo Welzl, editors, the 27th International Colloquium on Automata, Languages and Programming (ICALP), Volume 1853 of Lecture Notes in Computer Science, Pages 512-523, Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 512-523
-
-
Kilian, J.1
Cachin, C.2
Camenisch, J.3
Muller, J.4
-
6
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, Privacy preserving data mining, In Journal of Cryptology, Volume 15, Number 3, Pages 177-206, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
7
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
Choonsik Park and Seongtaek Chee, editors, In the Proceeding of the Seventh Annual International Conference in Information Security and Cryptology ICISC, of, Springer- Verlag, December
-
Helger Lipmaa, Bart Goethals, Sven Laur and Taneli Mielikainen, On secure scalar product computation for privacy-preserving data mining, In Choonsik Park and Seongtaek Chee, editors, In the Proceeding of the Seventh Annual International Conference in Information Security and Cryptology (ICISC 2004), Volume 3506 of Lecture Notes in Computer Science, pages 104-120, Springer- Verlag, December 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Lipmaa, H.1
Goethals, B.2
Laur, S.3
Mielikainen, T.4
-
8
-
-
0004127220
-
-
Cambridge University Press, New York
-
Rudolf Lidl and Harald Niederreiter, Finite Fields, Volume 20, Cambridge University Press, New York, 1997.
-
(1997)
Finite Fields
, vol.20
-
-
Lidl, R.1
Niederreiter, H.2
-
9
-
-
0002337124
-
How to play any mental game
-
ACM Press
-
M. Micali, O. Goldreich and A. Wigderson, How to play any mental game, In the ACM Symposium on Theory of Computing, Pages 218-229, ACM Press, 1987.
-
(1987)
In the ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Micali, M.1
Goldreich, O.2
Wigderson, A.3
-
10
-
-
1142282727
-
-
B. Pareneel, J. Claessens and J. Vandewalle, (How) can mobile agents do secure electronic transactions on un-trusted hosts? a survey of the security issues and the current solutions, In ACM transactions on internet technology, 3, pages 28-48, February 2003.
-
B. Pareneel, J. Claessens and J. Vandewalle, (How) can mobile agents do secure electronic transactions on un-trusted hosts? a survey of the security issues and the current solutions, In ACM transactions on internet technology, Volume 3, pages 28-48, February 2003.
-
-
-
-
11
-
-
84959058818
-
-
T. Sander, J. Feigenbaum, M. J. Freedman and A. Shostack, Privacy engineering for digital rights management systems, In T. Sander, editor, Digital Right Management 2001 (DRM 2001), 2320 of Lecture Notes in Computer Science, Pages 76-105, Springer-Verlag, 2002.
-
T. Sander, J. Feigenbaum, M. J. Freedman and A. Shostack, Privacy engineering for digital rights management systems, In T. Sander, editor, Digital Right Management 2001 (DRM 2001), Volume 2320 of Lecture Notes in Computer Science, Pages 76-105, Springer-Verlag, 2002.
-
-
-
-
12
-
-
84947772655
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
K. Ohta and D. Pei, editors, Advances in Cryptology- ASIACRYPT'98, of, Springer-Verlag, October
-
J. P. Stern, A new and efficient all-or-nothing disclosure of secrets protocol, In K. Ohta and D. Pei, editors, Advances in Cryptology- ASIACRYPT'98, Volume 1514 of Lecture Notes in Computer Science, Pages 357-371, Springer-Verlag, October 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1514
, pp. 357-371
-
-
Stern, J.P.1
-
14
-
-
0022882770
-
How to generate and exchange secrets (extended abstract)
-
Los Alamitos, editor, October
-
A. C. Yao, How to generate and exchange secrets (extended abstract), In Los Alamitos, editor, the 27th Annual IEEE Symposium on Foundations of Computer Science, IEEE, Pages 162-167, October 1986.
-
(1986)
the 27th Annual IEEE Symposium on Foundations of Computer Science, IEEE
, pp. 162-167
-
-
Yao, A.C.1
|