-
4
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review ad open problems
-
Cloudcroft, New Mexico, USA
-
W. L. Du, M. J. Atallah, "Secure multi-party computation problems and their applications: A review ad open problems," Proc. of New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, 2001, pp.11-20.
-
(2001)
Proc. of New Security Paradigms Workshop
, pp. 11-20
-
-
Du, W.L.1
Atallah, M.J.2
-
6
-
-
22844438241
-
An algorithm for privacy-preserving Boolean association rule mining
-
Yong-Long LUO, Liu-Sheng HUANG, "An algorithm for privacy-preserving Boolean association rule mining," Acta Electronica Sinica (in Chinese), Vol.33, No.5, 2005, pp.900-903.
-
(2005)
Acta Electronica Sinica (in Chinese)
, vol.33
, Issue.5
, pp. 900-903
-
-
Luo, Y.-L.1
Huang, L.-S.2
-
7
-
-
33646505576
-
Privacy-preserving distance measurement and its application
-
Yong-Long LUO, Liu-Sheng HUANG, "Privacy-preserving Distance Measurement and Its Application," Chinese Journal of Electronics Vol.15, No.2, 2006, pp.237-241.
-
(2006)
Chinese Journal of Electronics
, vol.15
, Issue.2
, pp. 237-241
-
-
Luo, Y.-L.1
Huang, L.-S.2
-
8
-
-
34147194714
-
Privacy-preserving cross product protocol and its applications
-
Feb.
-
Yong-Long LUO, Liu-Sheng HUANG, "Privacy-preserving Cross Product Protocol and Its Applications," Chinese Journal of Computers, Vol.30, No.2, Feb.2007.
-
(2007)
Chinese Journal of Computers
, vol.30
, Issue.2
-
-
Luo, Y.-L.1
Huang, L.-S.2
-
9
-
-
33847075772
-
Secure two-party point-circle inclusion problem
-
DOI 10.1007/s11390-007-9011-0
-
Yong-Long LUO, Liu-Sheng HUANG, "Secure Two-Party Point-Circle Inclusion Problem," Journal of Computer Science & Technology, Jan. 2007, Vol.22, No.1, pp.88-91. (Pubitemid 46261896)
-
(2007)
Journal of Computer Science and Technology
, vol.22
, Issue.1
, pp. 88-91
-
-
Luo, Y.-L.1
Huang, L.-S.2
Zhong, H.3
-
10
-
-
84958035648
-
Secure Multi-party Computational Geometry
-
Algorithms and Data Structures 7th International Workshop, WADS 2001 Providence, RI, USA, August 8-10, 2001 Proceedings
-
M. J. Atallah, W. L. Du, "Secure multi-party computational geometry," Lecture Notes in Computer Science, Vol.2125, Springer. Proc. of 7th International Workshop on Algorithms and Data Structures (WADS), 2001, pp.165-179. (Pubitemid 33315644)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2125
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
12
-
-
49049100722
-
Privacy-preserving protocol for finding the convex hulls
-
Barcelona, Spain
-
Qi WANG, Yong-Long LUO, Liu-Sheng HUANG, "Privacy-preserving Protocol for Finding the Convex Hulls," Proc. of the Third International Conference on Availability, Reliability and Security, Barcelona, Spain, 2008, pp.727-732.
-
(2008)
Proc. of the Third International Conference on Availability, Reliability and Security
, pp. 727-732
-
-
Wang, Q.1
Luo, Y.-L.2
Huang, L.-S.3
-
15
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
Vancouver, British Columbia
-
I. Ioannidis, A. Grama, M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," Proc. of the 2002 International Conference on Parallel Processing, Vancouver, British Columbia, 2002, pp. 379-384.
-
(2002)
Proc. of the 2002 International Conference on Parallel Processing
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
17
-
-
84870504149
-
A new efficient privacy-preserving scalar product protocol
-
Gold Coast, Australia
-
A. Amirbekyan, V Estivill-Castro, "A New Efficient Privacy-Preserving Scalar Product Protocol", Proc. of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Australia, 2007, pp. 209-214.
-
(2007)
Proc. of the Sixth Australasian Data Mining Conference (AusDM 2007)
, pp. 209-214
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
18
-
-
62749136258
-
Privacy-preserving practical convex hulls protocol
-
Nagasaki, Japan, Dec.
-
You-wen ZHU, Liu-Sheng HUANG, Wei YANG, "Privacy-preserving Practical Convex Hulls Protocol", the 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2008), Nagasaki, Japan, Dec. 2008.
-
(2008)
The 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology (FCST 2008)
-
-
Zhu, Y.-W.1
Huang, L.-S.2
Yang, W.3
-
19
-
-
1642379074
-
Dense probabilistic encryption
-
Kingston, Canada, May
-
J. Benaloh, "Dense probabilistic encryption", Proc. of the Workshop on Selected Areas of Cryptography, Kingston, Canada, May 1994, pp. 120-128.
-
(1994)
Proc. of the Workshop on Selected Areas of Cryptography
, pp. 120-128
-
-
Benaloh, J.1
-
21
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Advances in Cryptology-Eurocrypt 1998, Springer
-
T. Okamoto, S. Uchiyama, "A new public-key cryptosystem as secure as factoring", Advances in Cryptology-Eurocrypt 1998, LNCS 1403, Springer, 1998, pp.308-318.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
22
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology-Eurocrypt 1999, Springer
-
P. Paillier, "Public key cryptosystems based on composite degree residuosity classes", Advances in Cryptology-Eurocrypt 1999, LNCS 1592, Springer, 1999, pp.223-238.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
84888252697
-
All-or-nothing disclosure of secrets
-
Advances in Cryptology-Crypto86
-
G.Brassard, C.Crepeau, J.Robert. "All-or-nothing disclosure of secrets", Advances in Cryptology-Crypto86, Lecture Notes in Computer Science, 1987, pp.234-238.
-
(1987)
Lecture Notes in Computer Science
, pp. 234-238
-
-
Brassard, G.1
Crepeau, C.2
Robert, J.3
|