메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 33-46

Enhancing privacy in remote data classification

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); INTERNET PROTOCOLS;

EID: 48249117481     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_3     Document Type: Conference Paper
Times cited : (14)

References (25)
  • 4
    • 84948952992 scopus 로고    scopus 로고
    • Minimal-latency secure function evaluation
    • Proc. of EUROCRYPT00
    • Beaver, D.: Minimal-latency secure function evaluation. Proc. of EUROCRYPT00, LNCS pp. 335-350 (2000)
    • (2000) LNCS , pp. 335-350
    • Beaver, D.1
  • 6
    • 23844556499 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation and oblivious neural learning
    • Chang, Y., Lu, C.: Oblivious polynomial evaluation and oblivious neural learning. Theoretical Computer Science 341(1), 39-54 (2005)
    • (2005) Theoretical Computer Science , vol.341 , Issue.1 , pp. 39-54
    • Chang, Y.1    Lu, C.2
  • 7
    • 33645680170 scopus 로고    scopus 로고
    • Blind newton sensitivity attack. Information Security
    • Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: Blind newton sensitivity attack. Information Security, IEE Proceedings 153(3), 115-125 (2006)
    • (2006) IEE Proceedings , vol.153 , Issue.3 , pp. 115-125
    • Comesana, P.1    Perez-Freire, L.2    Perez-Gonzalez, F.3
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
    • Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In: Public Key Cryptography, pp. 119-136 (2001)
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 13
    • 0024880831 scopus 로고
    • Multilayer feedforward networks are universal approximators
    • Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359-366 (1989)
    • (1989) Neural Netw , vol.2 , Issue.5 , pp. 359-366
    • Hornik, K.1    Stinchcombe, M.2    White, H.3
  • 15
    • 0032311781 scopus 로고    scopus 로고
    • Kalker, T., Linnartz, J.P.M.G., van Dijk,M.:WAtermark estimation through detector analysis. In: ICIP98, I, pp. 425-429. Chicago, IL, USA (1998)
    • Kalker, T., Linnartz, J.P.M.G., van Dijk,M.:WAtermark estimation through detector analysis. In: ICIP98, vol. I, pp. 425-429. Chicago, IL, USA (1998)
  • 19
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining. In Advances in Cryptology - CRYPTO '00, volume 1880 of Lecture Notes in Computer
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. In Advances in Cryptology - CRYPTO '00, volume 1880 of Lecture Notes in Computer Science 1880, 36-54 (2000)
    • (2000) Science , vol.1880 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Proceedings of Eurocrypt'99, Springer-Verlag
    • Pailler, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt'99, Lecture Notes is Computer Science vol. 1592, pp. 223-238. Springer-Verlag (1999)
    • (1999) Lecture Notes is Computer Science , vol.1592 , pp. 223-238
    • Pailler, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.