메뉴 건너뛰기




Volumn , Issue , 2009, Pages 554-558

Three new approaches to privacy-preserving add to multiply protocol and its application

Author keywords

Add and multiply exchanging technolog; Add to multiply protocol; Privacy preserving; Secure multiparty computation

Indexed keywords

ADD-AND-MULTIPLY EXCHANGING TECHNOLOG; ADD-TO-MULTIPLY PROTOCOL; COMMUNICATION OVERHEADS; COMPUTATION EFFORT; NEW APPROACHES; NEW PROTOCOL; PRIVACY PRESERVING DATA MINING; PRIVACY-PRESERVING; PRIVATE DATA; SCALAR PRODUCT PROTOCOL; SECURE MULTIPARTY COMPUTATION; SECURITY SITUATION;

EID: 66249084847     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WKDD.2009.34     Document Type: Conference Paper
Times cited : (19)

References (23)
  • 4
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review ad open problems
    • Cloudcroft, New Mexico, USA
    • W. L. Du, M. J. Atallah, "Secure multi-party computation problems and their applications: A review ad open problems," Proc. of New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, 2001, pp.11-20.
    • (2001) Proc. of New Security Paradigms Workshop , pp. 11-20
    • Du, W.L.1    Atallah, M.J.2
  • 6
    • 22844438241 scopus 로고    scopus 로고
    • An algorithm for privacy-preserving Boolean association rule mining
    • Yong-Long LUO, Liu-Sheng HUANG, "An algorithm for privacy-preserving Boolean association rule mining," Acta Electronica Sinica (in Chinese), Vol.33, No.5, 2005, pp.900-903.
    • (2005) Acta Electronica Sinica (in Chinese) , vol.33 , Issue.5 , pp. 900-903
    • Luo, Y.-L.1    Huang, L.-S.2
  • 7
    • 33646505576 scopus 로고    scopus 로고
    • Privacy-preserving distance measurement and its application
    • Yong-Long LUO, Liu-Sheng HUANG, "Privacy-preserving Distance Measurement and Its Application," Chinese Journal of Electronics Vol.15, No.2, 2006, pp.237-241.
    • (2006) Chinese Journal of Electronics , vol.15 , Issue.2 , pp. 237-241
    • Luo, Y.-L.1    Huang, L.-S.2
  • 8
    • 34147194714 scopus 로고    scopus 로고
    • Privacy-preserving cross product protocol and its applications
    • Feb.
    • Yong-Long LUO, Liu-Sheng HUANG, "Privacy-preserving Cross Product Protocol and Its Applications," Chinese Journal of Computers, Vol.30, No.2, Feb.2007.
    • (2007) Chinese Journal of Computers , vol.30 , Issue.2
    • Luo, Y.-L.1    Huang, L.-S.2
  • 9
    • 33847075772 scopus 로고    scopus 로고
    • Secure two-party point-circle inclusion problem
    • DOI 10.1007/s11390-007-9011-0
    • Yong-Long LUO, Liu-Sheng HUANG, "Secure Two-Party Point-Circle Inclusion Problem," Journal of Computer Science & Technology, Jan. 2007, Vol.22, No.1, pp.88-91. (Pubitemid 46261896)
    • (2007) Journal of Computer Science and Technology , vol.22 , Issue.1 , pp. 88-91
    • Luo, Y.-L.1    Huang, L.-S.2    Zhong, H.3
  • 10
    • 84958035648 scopus 로고    scopus 로고
    • Secure Multi-party Computational Geometry
    • Algorithms and Data Structures 7th International Workshop, WADS 2001 Providence, RI, USA, August 8-10, 2001 Proceedings
    • M. J. Atallah, W. L. Du, "Secure multi-party computational geometry," Lecture Notes in Computer Science, Vol.2125, Springer. Proc. of 7th International Workshop on Algorithms and Data Structures (WADS), 2001, pp.165-179. (Pubitemid 33315644)
    • (2001) LECTURE NOTES in COMPUTER SCIENCE , Issue.2125 , pp. 165-179
    • Atallah, M.J.1    Du, W.2
  • 21
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Advances in Cryptology-Eurocrypt 1998, Springer
    • T. Okamoto, S. Uchiyama, "A new public-key cryptosystem as secure as factoring", Advances in Cryptology-Eurocrypt 1998, LNCS 1403, Springer, 1998, pp.308-318.
    • (1998) LNCS , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 22
    • 84942550998 scopus 로고    scopus 로고
    • Public key cryptosystems based on composite degree residuosity classes
    • Advances in Cryptology-Eurocrypt 1999, Springer
    • P. Paillier, "Public key cryptosystems based on composite degree residuosity classes", Advances in Cryptology-Eurocrypt 1999, LNCS 1592, Springer, 1999, pp.223-238.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.