-
1
-
-
0003772933
-
-
Second edn. Springer-Verlag
-
de Berg, M., van Kreveld, M., Overmars, M., Schwarzkopf, O. Computational Geometry: Algorithms and Applications. Second edn. Springer-Verlag (2000)
-
(2000)
Computational Geometry: Algorithms and Applications
-
-
de Berg, M.1
van Kreveld, M.2
Overmars, M.3
Schwarzkopf, O.4
-
2
-
-
49049118357
-
-
Joseph, O. Rourke. Computational Geometry in C, 2nd Edition Cambridge University Press
-
Joseph, O. Rourke. Computational Geometry in C, 2nd Edition Cambridge University Press
-
-
-
-
3
-
-
84958035648
-
-
Atallah, M.J., Du, W. Secure multi-party computational geometry. In International Workshop on Algorithms and Data Structures, Springer-Verlag (2001) 165-179
-
Atallah, M.J., Du, W. Secure multi-party computational geometry. In International Workshop on Algorithms and Data Structures, Springer-Verlag (2001) 165-179
-
-
-
-
4
-
-
49049108980
-
-
O. Goldreich, S. Micali, A. Wigderson. How to play mental game. In Ninteenth ACM Symposium on Theory of ComputingSTOC
-
O. Goldreich, S. Micali, A. Wigderson. How to play mental game. In Ninteenth ACM Symposium on Theory of Computing(STOC)
-
-
-
-
5
-
-
49049084948
-
-
Wenliang Du A Study Of Several Specific Secure Two Party Computation Problems PhD Thesis, Submitted to Purdue University, August
-
Wenliang Du A Study Of Several Specific Secure Two Party Computation Problems PhD Thesis, Submitted to Purdue University, August 2001
-
(2001)
-
-
-
6
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press
-
Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
7
-
-
35048871699
-
Single database private information retrieval with logarithmic communication. In ACISP. Volume 3108 of Lecture Notes in Computer
-
Chang, Y.C. Single database private information retrieval with logarithmic communication. In ACISP. Volume 3108 of Lecture Notes in Computer Science. (2004) 50-61
-
(2004)
Science
, pp. 50-61
-
-
Chang, Y.C.1
-
8
-
-
0030150177
-
Peter Winker Comparing Information without Leaking it
-
Ronald Fagin, Moni Naor, Peter Winker Comparing Information without Leaking it. In Communications of the ACM, volume 39, 5 (1996) 77-85
-
(1996)
In Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
-
11
-
-
33646793331
-
Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT. Volume 3788 of Lecture Notes in Computer
-
Brickell, J., Shmatikov, V. Privacy-preserving graph algorithms in the semi-honest model. In ASIACRYPT. Volume 3788 of Lecture Notes in Computer Science. (2005) 236-252
-
(2005)
Science
, pp. 236-252
-
-
Brickell, J.1
Shmatikov, V.2
-
12
-
-
84942550998
-
Public Key Cryptosystem based on Composite Degree Residue Class In Eurocrypt. Volume 1592 of Lecture Notes in Computer
-
Paillier, P. Public Key Cryptosystem based on Composite Degree Residue Class In Eurocrypt. Volume 1592 of Lecture Notes in Computer Science. (1999) 223-238
-
(1999)
Science
, pp. 223-238
-
-
Paillier, P.1
|