메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 434-437

A convex hull algorithm for planar point set based on privacy protecting

Author keywords

Computational geometry; Convex hull; Protocol; Secure multi party computation

Indexed keywords

CONVEX HULL; CONVEX HULL ALGORITHM; INFORMATION SECURITY; PLANAR POINT SETS; PRIVACY PROTECTING; PROTOCOL; RESEARCH FIELDS; SECURE MULTI-PARTY COMPUTATION;

EID: 69749107345     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ETCS.2009.626     Document Type: Conference Paper
Times cited : (4)

References (18)
  • 3
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Y. Lindell, B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 2002, 15(3): 177-206
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 4
    • 0030150177 scopus 로고    scopus 로고
    • Comparing Information Without Leaking It
    • Ronald Fagin, Moni Naor, and Peter Einkler. Comparing Information Without Leaking It. Communications of the ACM, 1996, 39(5): 77-85
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Einkler, P.3
  • 11
    • 33845446043 scopus 로고    scopus 로고
    • Secure Two-party Computation for Set Intersection Problem
    • LI Shundong, Dou Jiawei. Secure Two-party Computation for Set Intersection Problem. Journal of Xi'an Jiao Tong University, 2006, 40(10): 1091-1093
    • (2006) Journal of Xi'an Jiao Tong University , vol.40 , Issue.10 , pp. 1091-1093
    • Shundong, L.I.1    Jiawei, D.2
  • 13
    • 27744579240 scopus 로고    scopus 로고
    • Secure Multi-party Computation of Set-inclusion and Graph-inclusion
    • Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-party Computation of Set-inclusion and Graph-inclusion. Journal of Computer Research and Development, 2005, 42(10): 1647-1653
    • (2005) Journal of Computer Research and Development , vol.42 , Issue.10 , pp. 1647-1653
    • Shundong, L.1    Tiange, S.2    Yiqi, D.3
  • 14
    • 33744743349 scopus 로고    scopus 로고
    • Privacy protection in the relative position determination for two spatial geometric objects
    • DOI 10.1360/crad20060306
    • Luo Yonglong, Huang Liusheng. Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects. Journal of Computer Research and Development, 2006, 43(3): 410-416 (Pubitemid 43819179)
    • (2006) Jisuanji Yanjiu Yu Fazhan/Computer Research and Development , vol.43 , Issue.3 , pp. 410-416
    • Luo, Y.1    Huang, L.2    Jing, W.3    Xu, W.4
  • 15
    • 2942748384 scopus 로고    scopus 로고
    • A Protocol of Comparing Information without Leaking
    • QIN Jing, ZHANG Zhenfeng, FENG Dengguo, and LI Bao. A Protocol of Comparing Information without Leaking. Journal of Software, 2004. 15(3): 421-427
    • (2004) Journal of Software , vol.15 , Issue.3 , pp. 421-427
    • Qin, J.1    Zhang, Z.2    Feng, D.3    Li, B.4
  • 16
    • 22844441340 scopus 로고    scopus 로고
    • An Efficient Solution to Yao's Millionaire's Problem
    • Li Shundong, Dai Yiqi, and You Qiyou. An Efficient Solution to Yao's Millionaire's Problem. Acta Electronica Sinica, 2005, 33(5): 669-773
    • (2005) Acta Electronica Sinica , vol.33 , Issue.5 , pp. 669-773
    • Shundong, L.1    Yiqi, D.2    Qiyou, Y.3
  • 18
    • 1342345050 scopus 로고    scopus 로고
    • Efficient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
    • J
    • Wen-Guey Tzeng. Efficient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters [J]. IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (2): 232-240
    • (2004) IEEE Transactions on Computers , vol.53 , Issue.2 , pp. 232-240
    • Tzeng, W.-G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.