-
2
-
-
0023545076
-
How to play ANY mental game
-
New York, ACM Press
-
Goldreich O., Micali S., Wigderson A. How to play ANY mental game. In: Proceedings of the 19th Annual ACM Conference on Theory of Computing. New York, ACM Press, 1987, 218-229.
-
(1987)
Proceedings of the 19th Annual ACM Conference on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
3
-
-
51849143163
-
-
O.Goldreich. The Foundations of Cryptography-2. London: Cambridge University Press, 2004.
-
O.Goldreich. The Foundations of Cryptography-Volume 2. London: Cambridge University Press, 2004.
-
-
-
-
4
-
-
33845383858
-
Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques
-
New York: Springer-Verlag, 1-55
-
C. Cachin, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (LNCS 3027), New York: Springer-Verlag, 2004, 1-55, 419-473.
-
(2004)
LNCS
, vol.3027
, pp. 419-473
-
-
Cachin, C.1
-
6
-
-
0030150177
-
Comparing information without leaking it
-
Fagin R., Naor M., Winkler P. Comparing information without leaking it. Communications of the ACM, 1996, 39(5): 77-85.
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Winkler, P.3
-
7
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y. and Pinkas B. Privacy preserving data mining. Journal of Cryptology, 2002, 15(3): 177-206.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
8
-
-
0034820931
-
Privacy-preserving cooperative scientific computations
-
Los Alamitos: IEEE Computer Society Press
-
Du W.L. and Atallah M.J. Privacy-preserving cooperative scientific computations. In: Proceedings of the 14th IEEE Computer Security Workshop. Los Alamitos: IEEE Computer Society Press, 2001, 273-282.
-
(2001)
Proceedings of the 14th IEEE Computer Security Workshop
, pp. 273-282
-
-
Du, W.L.1
Atallah, M.J.2
-
9
-
-
51849166899
-
-
Du W.L., Atallah M.J. Protocol for secure remote database access with approximate matching. In the 7th ACM Conference on Computer and Communication Security, The First Workshop on Security and Privacy in E-Commerce: New York: ACM Press, 2000, available at http://www.cis.syr.edu/~wedu/Researoh/publication. html [2005-02-25]
-
Du W.L., Atallah M.J. Protocol for secure remote database access with approximate matching. In the 7th ACM Conference on Computer and Communication Security, The First Workshop on Security and Privacy in E-Commerce: New York: ACM Press, 2000, available at http://www.cis.syr.edu/~wedu/Researoh/publication. html [2005-02-25]
-
-
-
-
11
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Society for Industrial & Applied
-
Du W.L., Han Y.H.S. and Chen S.G. Privacy-preserving multivariate statistical analysis: linear regression and classification. In: Proceedings of 2004 SIAM International Conference on Data Mining. Society for Industrial & Applied, 2004, pp. 222-233.
-
(2004)
Proceedings of 2004 SIAM International Conference on Data Mining
, pp. 222-233
-
-
Du, W.L.1
Han, Y.H.S.2
Chen, S.G.3
-
14
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, New York: Springer-Verlag
-
M.J.Freedman, K.Nissim, B.Pinkas. Efficient Private Matching and Set Intersection. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques (LNCS 3027), New York: Springer-Verlag, 2004, pp.1-19.
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
15
-
-
0242496951
-
SMC problems and their applications: A review and open problems
-
New York: ACM Press
-
Du W.L., Atallah M.J. SMC problems and their applications: A review and open problems. In: Proceedings of New Security Paradigms Workshop 2001. New York: ACM Press, 2001, 13-22.
-
(2001)
Proceedings of New Security Paradigms Workshop
, pp. 13-22
-
-
Du, W.L.1
Atallah, M.J.2
-
17
-
-
25844451115
-
Efficient Secure Multi-party Computation Protocol for Yao's Millionaires' Problem based on set-inclusion
-
Shundong Li, Yiqi Dai, Qiyou You. Efficient Secure Multi-party Computation Protocol for Yao's Millionaires' Problem based on set-inclusion. Progress in Natural Science, 2005, Vol.15 (9): 851-856
-
(2005)
Progress in Natural Science
, vol.15
, Issue.9
, pp. 851-856
-
-
Li, S.1
Dai, Y.2
You, Q.3
-
18
-
-
22844441340
-
Efficient solution to Yao's Millionaires' problem
-
Li Shun-dong, Dai Yi-qi, You Qi-you. Efficient solution to Yao's Millionaires' problem. Electronica Sinica, Vol.33(5): 769-773, 2005.
-
(2005)
Electronica Sinica
, vol.33
, Issue.5
, pp. 769-773
-
-
Li, S.-D.1
Dai, Y.-Q.2
Qi-you, Y.3
|