-
2
-
-
48249089807
-
Recommendation for Key Management-Part 1: General
-
Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management-Part 1: General. NIST Special Publication pp. 800-57 (2005)
-
(2005)
NIST Special Publication
, pp. 800-857
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
3
-
-
33750908650
-
A privacy-preserving protocol for neural-network-based computation
-
Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: MM&Sec '06: Proceeding of the 8th Workshop on Multimedia and Security, pp. 146-151 (2006)
-
(2006)
MM&Sec '06: Proceeding of the 8th Workshop on Multimedia and Security
, pp. 146-151
-
-
Barni, M.1
Orlandi, C.2
Piva, A.3
-
4
-
-
84948952992
-
Minimal-latency secure function evaluation
-
Proc. of EUROCRYPT00
-
Beaver, D.: Minimal-latency secure function evaluation. Proc. of EUROCRYPT00, LNCS pp. 335-350 (2000)
-
(2000)
LNCS
, pp. 335-350
-
-
Beaver, D.1
-
6
-
-
23844556499
-
Oblivious polynomial evaluation and oblivious neural learning
-
Chang, Y., Lu, C.: Oblivious polynomial evaluation and oblivious neural learning. Theoretical Computer Science 341(1), 39-54 (2005)
-
(2005)
Theoretical Computer Science
, vol.341
, Issue.1
, pp. 39-54
-
-
Chang, Y.1
Lu, C.2
-
7
-
-
33645680170
-
Blind newton sensitivity attack. Information Security
-
Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: Blind newton sensitivity attack. Information Security, IEE Proceedings 153(3), 115-125 (2006)
-
(2006)
IEE Proceedings
, vol.153
, Issue.3
, pp. 115-125
-
-
Comesana, P.1
Perez-Freire, L.2
Perez-Gonzalez, F.3
-
8
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In: Public Key Cryptography, pp. 119-136 (2001)
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
10
-
-
84957002266
-
CryptoComputing with rationals
-
Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. Financial-Cryptography.-6th-International-Conference, Lecture-Notesin-Computer-Science 2357, 136-46 (2003)
-
(2003)
Financial-Cryptography.-6th-International-Conference, Lecture-Notesin-Computer-Science
, vol.2357
, pp. 136-146
-
-
Fouque, P.1
Stern, J.2
Wackers, G.3
-
11
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S.,Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC '87: Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 218-229 (1987)
-
(1987)
STOC '87: Proceedings of the twentieth annual ACM symposium on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
13
-
-
0024880831
-
Multilayer feedforward networks are universal approximators
-
Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359-366 (1989)
-
(1989)
Neural Netw
, vol.2
, Issue.5
, pp. 359-366
-
-
Hornik, K.1
Stinchcombe, M.2
White, H.3
-
15
-
-
0032311781
-
-
Kalker, T., Linnartz, J.P.M.G., van Dijk,M.:WAtermark estimation through detector analysis. In: ICIP98, I, pp. 425-429. Chicago, IL, USA (1998)
-
Kalker, T., Linnartz, J.P.M.G., van Dijk,M.:WAtermark estimation through detector analysis. In: ICIP98, vol. I, pp. 425-429. Chicago, IL, USA (1998)
-
-
-
-
18
-
-
33749576809
-
Cryptographically private support vector machines
-
Laur, S., Lipmaa, H., Mielikäinen, T.: Cryptographically private support vector machines. In: KDD '06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge discovery and data mining, pp. 618-624 (2006)
-
(2006)
KDD '06: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge discovery and data mining
, pp. 618-624
-
-
Laur, S.1
Lipmaa, H.2
Mielikäinen, T.3
-
19
-
-
84974555530
-
Privacy preserving data mining. In Advances in Cryptology - CRYPTO '00, volume 1880 of Lecture Notes in Computer
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. In Advances in Cryptology - CRYPTO '00, volume 1880 of Lecture Notes in Computer Science 1880, 36-54 (2000)
-
(2000)
Science
, vol.1880
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Proceedings of Eurocrypt'99, Springer-Verlag
-
Pailler, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt'99, Lecture Notes is Computer Science vol. 1592, pp. 223-238. Springer-Verlag (1999)
-
(1999)
Lecture Notes is Computer Science
, vol.1592
, pp. 223-238
-
-
Pailler, P.1
-
22
-
-
0000646059
-
Learning internal representations by error propogation
-
Rumelhart, D., Hinton, G., Williams, R.: Learning internal representations by error propogation. Parallel distributed processing: Explorations in the microstructure of cognition 1, 318-362 (1986)
-
(1986)
Parallel distributed processing: Explorations in the microstructure of cognition
, vol.1
, pp. 318-362
-
-
Rumelhart, D.1
Hinton, G.2
Williams, R.3
|