메뉴 건너뛰기




Volumn , Issue , 2008, Pages 446-451

Privacy preserving shortest path computation in presence of convex polygonal obstacles

Author keywords

[No Author keywords available]

Indexed keywords

INTERNATIONAL CONFERENCES; PRIVACY PRESERVING; SHORTEST PATH; SHORTEST PATH COMPUTATIONS;

EID: 49049084899     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.141     Document Type: Conference Paper
Times cited : (4)

References (12)
  • 2
    • 49049118357 scopus 로고    scopus 로고
    • Joseph, O. Rourke. Computational Geometry in C, 2nd Edition Cambridge University Press
    • Joseph, O. Rourke. Computational Geometry in C, 2nd Edition Cambridge University Press
  • 3
    • 84958035648 scopus 로고    scopus 로고
    • Atallah, M.J., Du, W. Secure multi-party computational geometry. In International Workshop on Algorithms and Data Structures, Springer-Verlag (2001) 165-179
    • Atallah, M.J., Du, W. Secure multi-party computational geometry. In International Workshop on Algorithms and Data Structures, Springer-Verlag (2001) 165-179
  • 4
    • 49049108980 scopus 로고    scopus 로고
    • O. Goldreich, S. Micali, A. Wigderson. How to play mental game. In Ninteenth ACM Symposium on Theory of ComputingSTOC
    • O. Goldreich, S. Micali, A. Wigderson. How to play mental game. In Ninteenth ACM Symposium on Theory of Computing(STOC)
  • 5
    • 49049084948 scopus 로고    scopus 로고
    • Wenliang Du A Study Of Several Specific Secure Two Party Computation Problems PhD Thesis, Submitted to Purdue University, August
    • Wenliang Du A Study Of Several Specific Secure Two Party Computation Problems PhD Thesis, Submitted to Purdue University, August 2001
    • (2001)
  • 6
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press
    • Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 7
    • 35048871699 scopus 로고    scopus 로고
    • Single database private information retrieval with logarithmic communication. In ACISP. Volume 3108 of Lecture Notes in Computer
    • Chang, Y.C. Single database private information retrieval with logarithmic communication. In ACISP. Volume 3108 of Lecture Notes in Computer Science. (2004) 50-61
    • (2004) Science , pp. 50-61
    • Chang, Y.C.1
  • 8
    • 0030150177 scopus 로고    scopus 로고
    • Peter Winker Comparing Information without Leaking it
    • Ronald Fagin, Moni Naor, Peter Winker Comparing Information without Leaking it. In Communications of the ACM, volume 39, 5 (1996) 77-85
    • (1996) In Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2
  • 11
    • 33646793331 scopus 로고    scopus 로고
    • Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT. Volume 3788 of Lecture Notes in Computer
    • Brickell, J., Shmatikov, V. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT. Volume 3788 of Lecture Notes in Computer Science. (2005) 236-252
    • (2005) Science , pp. 236-252
    • Brickell, J.1    Shmatikov, V.2
  • 12
    • 84942550998 scopus 로고    scopus 로고
    • Public Key Cryptosystem based on Composite Degree Residue Class In Eurocrypt. Volume 1592 of Lecture Notes in Computer
    • Paillier, P. Public Key Cryptosystem based on Composite Degree Residue Class In Eurocrypt. Volume 1592 of Lecture Notes in Computer Science. (1999) 223-238
    • (1999) Science , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.