-
3
-
-
24144477856
-
Secure computation of the mean and related statistics
-
Proc. Theory Cryptography Conf
-
E. Kiltz, G. Leander, and J. Malone-Lee, "Secure computation of the mean and related statistics," in Proc. Theory Cryptography Conf., 2005, vol. 3378, Lecture Notes in Computer Science, pp. 283-302.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 283-302
-
-
Kiltz, E.1
Leander, G.2
Malone-Lee, J.3
-
4
-
-
37648998755
-
Blind Vision
-
S. Avidan and M. Butman, "Blind Vision," in Proc. ECCV, 2006, vol. 3, pp. 1-13.
-
(2006)
Proc. ECCV
, vol.3
, pp. 1-13
-
-
Avidan, S.1
Butman, M.2
-
5
-
-
20444449548
-
Secure multi-party computation
-
Online, Available
-
O. Goldreich, "Secure multi-party computation," Working Draft, 2000 [Online]. Available: http://citeseer.ist.psu.edu/ goldreich98secure.html
-
(2000)
Working Draft
-
-
Goldreich, O.1
-
6
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
7
-
-
64149129636
-
-
S. Laur and H. Lipmaa, Additive conditional disclosure of secrets and applications, Cryptology ePrint Archive, 2005, Rep. 2005/378.
-
S. Laur and H. Lipmaa, "Additive conditional disclosure of secrets and applications," Cryptology ePrint Archive, 2005, Rep. 2005/378.
-
-
-
-
8
-
-
84946847417
-
Oblivious polynomial evaluation and oblivious neural learning
-
Proc. Adv. Cryptol-Asiacrypt'01
-
Y.-C. Chang and C.-J. Lu, "Oblivious polynomial evaluation and oblivious neural learning," in Proc. Adv. Cryptol-Asiacrypt'01, 2001, vol. 2248, Lecture Notes in Computer Science, pp. 369-384.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 369-384
-
-
Chang, Y.-C.1
Lu, C.-J.2
-
9
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, C. Park and S. Chee, Eds, Proc. Int. Conf. Inf. Security Cryptol
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, C. Park and S. Chee, Eds., "On private scalar product computation for privacy-preserving data mining," in Proc. Int. Conf. Inf. Security Cryptol., 2004, vol. 2506, Lecture Notes in Computer Science, pp. 104-120.
-
(2004)
Lecture Notes in Computer Science
, vol.2506
, pp. 104-120
-
-
-
10
-
-
84927517111
-
Privacy-preserving cooperative statistical analysis
-
New Orleans, LA, Dec
-
W. Du and M. J. Atallah, "Privacy-preserving cooperative statistical analysis," in Proc. 17th Annu. Comput. Security Applicat. Conf., New Orleans, LA, Dec. 2001, pp. 102-110.
-
(2001)
Proc. 17th Annu. Comput. Security Applicat. Conf
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
11
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
Virginia Beach, VA, Sep. 23-26
-
W. Du and Z. Zhan, "A practical approach to solve secure multi-party computation problems," in Proc. New Security Paradigms Workshop, Virginia Beach, VA, Sep. 23-26, 2002, pp. 127-135.
-
(2002)
Proc. New Security Paradigms Workshop
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
12
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
Vancouver, BC, Canada
-
I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," in Proc. Int. Conf. Parallel Process., Vancouver, BC, Canada, 2002, pp. 379-384.
-
(2002)
Proc. Int. Conf. Parallel Process
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
13
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
Brighton, U.K
-
P. Ravikumar, W. W. Cohen, and S. E. Fienberg, "A secure protocol for computing string distance metrics," in Proc. Workshop Privacy and Security Aspects of Data Mining, Brighton, U.K., 2004, pp. 40-46.
-
(2004)
Proc. Workshop Privacy and Security Aspects of Data Mining
, pp. 40-46
-
-
Ravikumar, P.1
Cohen, W.W.2
Fienberg, S.E.3
-
14
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, AB, Canada, ACM SIGKDD
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in Proc. Int. Conf. Knowledge Discovery and Data Mining, Edmonton, AB, Canada, 2002, ACM SIGKDD.
-
(2002)
Proc. Int. Conf. Knowledge Discovery and Data Mining
-
-
Vaidya, J.1
Clifton, C.2
-
15
-
-
1642327704
-
Secure and private sequence comparisons
-
Washington, DC, Oct
-
M. J. Atallah, F. Kerschbaum, and W. Du, "Secure and private sequence comparisons," in Proc.Workshop Privacy Electron. Soc.,Washington, DC, Oct. 2003, pp. 39-44.
-
(2003)
Proc.Workshop Privacy Electron. Soc
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
16
-
-
35048846561
-
Strong conditional oblivious transfer and computing on intervals
-
Proc. Adv. Cryptol, Asiacrypt'04, P. J. Lee, Ed. New York: Springer-Verlag
-
I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in Proc. Adv. Cryptol.- Asiacrypt'04, P. J. Lee, Ed. New York: Springer-Verlag, 2004, vol. 3329, LNCS, pp. 515-529.
-
(2004)
LNCS
, vol.3329
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
17
-
-
26444581774
-
An efficient solution to the millionaires' problem based on homomorphic encryption
-
Proc Int. Conf. Appl. Cryptography Network Security
-
H.-Y. Lin and W.-G. Tzeng, "An efficient solution to the millionaires' problem based on homomorphic encryption," in Proc Int. Conf. Appl. Cryptography Network Security, 2005, vol. 3531, LNCS, pp. 456-466.
-
(2005)
LNCS
, vol.3531
, pp. 456-466
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
18
-
-
33646358700
-
Experimental analysis of a privacy-preserving scalar product protocol
-
Z. Yang, R. Wright, and H. Subramaniam, "Experimental analysis of a privacy-preserving scalar product protocol," Int. J. Comput. Syst. Sci. Eng., vol. 21, no. 1, pp. 47-52, 2006.
-
(2006)
Int. J. Comput. Syst. Sci. Eng
, vol.21
, Issue.1
, pp. 47-52
-
-
Yang, Z.1
Wright, R.2
Subramaniam, H.3
-
19
-
-
84867553981
-
A generalisation, simplification and some applications of Paillier's probabilistic public-key system
-
Proc. Int. Workshop Practice Theory Public Key Cryptography
-
I. Damgard and M. Jurik, "A generalisation, simplification and some applications of Paillier's probabilistic public-key system," in Proc. Int. Workshop Practice Theory Public Key Cryptography, 2001, vol. 1992, Lecture Notes in Computer Science, pp. 119-136.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, J. Stern, Ed, Proc. Adv. Cryptol.-Eurocrypt'99
-
P. Paillier, J. Stern, Ed., "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Adv. Cryptol.-Eurocrypt'99, 1999, vol. 1592, Lecture Notes in Computer Science, pp. 223-238.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
|