메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 17-31

Practical privacy-preserving benchmarking

Author keywords

[No Author keywords available]

Indexed keywords

COMMERCE; ECONOMIC AND SOCIAL EFFECTS; HISTORIC PRESERVATION; SECURITY OF DATA; STATISTICS;

EID: 48249134708     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_2     Document Type: Conference Paper
Times cited : (32)

References (34)
  • 7
    • 48249158422 scopus 로고    scopus 로고
    • I. Damgard, and Y. Ishai Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. Proceedings of CRYPTO, 2005.
    • I. Damgard, and Y. Ishai Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator. Proceedings of CRYPTO, 2005.
  • 28
    • 0000277371 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. Proceedings of EUROCRYPT, 1999.
    • (1999) Proceedings of EUROCRYPT
    • Paillier, P.1
  • 31
    • 0017930809 scopus 로고    scopus 로고
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 1978.
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 1978.
  • 32
    • 0030832833 scopus 로고    scopus 로고
    • Dummynet: A simple approach to the evaluation of network protocols
    • L. Rizzo. Dummynet: A simple approach to the evaluation of network protocols. ACM Computer Communication Review 27(1), 1997.
    • (1997) ACM Computer Communication Review , vol.27 , Issue.1
    • Rizzo, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.