메뉴 건너뛰기




Volumn , Issue , 2008, Pages 51-54

The cost of protecting privacy in multimedia applications

Author keywords

Complexity; Multimedia application; Negotiation; Oblivious; Oblivious polynomial evaluation; Privacy; Quality of Service; Transfer; User preferences; User's satisfaction

Indexed keywords

APPLICATIONS; COMPUTER PRIVACY; INTERNET; INTERNET PROTOCOLS; MULTIMEDIA SYSTEMS; QUALITY OF SERVICE; TELECOMMUNICATION NETWORKS; TELECOMMUNICATION SERVICES; WIRELESS NETWORKS;

EID: 63449125027     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1454586.1454595     Document Type: Conference Paper
Times cited : (1)

References (20)
  • 2
    • 71149116146 scopus 로고
    • Proofs that Yield Nothing but their Validiaty, and a Methodology of Cryptographic Protocol Design
    • O. Goldreich, S. Micali, and A. Wigderson, "Proofs that Yield Nothing but their Validiaty, and a Methodology of Cryptographic Protocol Design", In Journal of the ACM, vol. 38, 1991, pp. 691-729.
    • (1991) In Journal of the ACM , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 3
    • 0022080529 scopus 로고
    • A randomized Protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel, "A randomized Protocol for signing contracts", Communications of the ACM, Vol. 28, No. 6, 1985, pp. 637-647.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 4
    • 85181647685 scopus 로고    scopus 로고
    • S. Even, O. Goldreich, and A. Lempel, A randomized protocol for signing contracts, (extended abstract). In Advances in Cryptology: Proceedings of Crypto 82, pages 205-210. Plenum Press, New York and London, 1983, 23- 25 Aug, 1982.
    • S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts," (extended abstract). In Advances in Cryptology: Proceedings of Crypto 82, pages 205-210. Plenum Press, New York and London, 1983, 23- 25 Aug, 1982.
  • 5
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of ACM, Vol.21, No.2, pp.120-126, Feb 1978.
    • (1978) Communications of ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 6
    • 63449103303 scopus 로고    scopus 로고
    • http://www.eskimo.com/-weidai/benchmarks.html
  • 8
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Proc. CRYPTO, Springer
    • Y. Lindell and B. Pinkas, "Privacy preserving data mining," Proc. CRYPTO 2000, Lecture Notes in Computer Science, Vol. 1880 (Springer, 2000), pp. 360-54.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 360-454
    • Lindell, Y.1    Pinkas, B.2
  • 9
    • 84946847417 scopus 로고    scopus 로고
    • Oblivious Polynomial Evaluation and Oblivious Neural Learning
    • Y.C. Chang, and C.J. Lu, "Oblivious Polynomial Evaluation and Oblivious Neural Learning," ASIACRYPT 2001: 369- 384
    • (2001) ASIACRYPT , pp. 369-384
    • Chang, Y.C.1    Lu, C.J.2
  • 10
    • 84957104180 scopus 로고    scopus 로고
    • Two party RSA key generation
    • N. Gilboa, "Two party RSA key generation", CRYPTO 1999, 116-129.
    • (1999) CRYPTO , pp. 116-129
    • Gilboa, N.1
  • 11
    • 0034507841 scopus 로고    scopus 로고
    • Y. Ishai and E. Kushilevitz, Randomizing Polynomials, A New Representation with Applications to Round-Efficient Secure Computation, IEEE Symposium on Foundations of Computer Science, 2000.
    • Y. Ishai and E. Kushilevitz, Randomizing Polynomials, "A New Representation with Applications to Round-Efficient Secure Computation", IEEE Symposium on Foundations of Computer Science, 2000.
  • 16
    • 49049087023 scopus 로고    scopus 로고
    • Quality of Security Service: Adaptive Security
    • to appear in The, John Wiley&Sons, Inc. December
    • T. E. Levin, C. E. Irvine, and E. Spyropoulou, "Quality of Security Service: Adaptive Security", to appear in The Handbook of Information Security, John Wiley&Sons, Inc. December 2005
    • (2005) Handbook of Information Security
    • Levin, T.E.1    Irvine, C.E.2    Spyropoulou, E.3
  • 17
    • 0033879496 scopus 로고    scopus 로고
    • C. Irvine and T. Levin. Toward Quality of Security Service in a Resource Management System Benefit Function, Proceedings of the Heterogeneous Computing Workshop. Cancun, Mexico, 2000.
    • C. Irvine and T. Levin. "Toward Quality of Security Service in a Resource Management System Benefit Function," Proceedings of the Heterogeneous Computing Workshop. Cancun, Mexico, 2000.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.