-
3
-
-
33746437508
-
Privacy Preserving Data Mining
-
Y. Lindell, B. Pinkas. Privacy Preserving Data Mining. Journal of Cryptology, 2002, 15(3): 177-206
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
4
-
-
0030150177
-
Comparing Information Without Leaking It
-
Ronald Fagin, Moni Naor, and Peter Einkler. Comparing Information Without Leaking It. Communications of the ACM, 1996, 39(5): 77-85
-
(1996)
Communications of the ACM
, vol.39
, Issue.5
, pp. 77-85
-
-
Fagin, R.1
Naor, M.2
Einkler, P.3
-
6
-
-
69749111389
-
Protocol for Secure Remote Database Access with Approximate Matching
-
Du Wenliang, J. Mikhail Atallah. Protocol for Secure Remote Database Access with Approximate Matching. The 7th ACM Conference on Computer and Communication Security, The First Workshop on Security and Privacy in E-Commerce, Athens,Greece, 2000
-
The 7th ACM Conference on Computer and Communication Security, the First Workshop on Security and Privacy in E-Commerce, Athens,Greece, 2000
-
-
Wenliang, D.1
Atallah, J.M.2
-
11
-
-
33845446043
-
Secure Two-party Computation for Set Intersection Problem
-
LI Shundong, Dou Jiawei. Secure Two-party Computation for Set Intersection Problem. Journal of Xi'an Jiao Tong University, 2006, 40(10): 1091-1093
-
(2006)
Journal of Xi'an Jiao Tong University
, vol.40
, Issue.10
, pp. 1091-1093
-
-
Shundong, L.I.1
Jiawei, D.2
-
12
-
-
37149002276
-
Secure multi-party computations of geometric intersections
-
Li Shundong, Dai Yiqi. Secure Multi-party Computations of Geometric Intersections. J Tsinghua Univ (Sci & Tech), 2007, 47(10): 1692-1695 (Pubitemid 350257457)
-
(2007)
Qinghua Daxue Xuebao/Journal of Tsinghua University
, vol.47
, Issue.10
, pp. 1692-1695
-
-
Li, S.1
Dai, Y.2
Wang, D.3
Luo, P.4
-
13
-
-
27744579240
-
Secure Multi-party Computation of Set-inclusion and Graph-inclusion
-
Li Shundong, Si Tiange, and Dai Yiqi. Secure Multi-party Computation of Set-inclusion and Graph-inclusion. Journal of Computer Research and Development, 2005, 42(10): 1647-1653
-
(2005)
Journal of Computer Research and Development
, vol.42
, Issue.10
, pp. 1647-1653
-
-
Shundong, L.1
Tiange, S.2
Yiqi, D.3
-
14
-
-
33744743349
-
Privacy protection in the relative position determination for two spatial geometric objects
-
DOI 10.1360/crad20060306
-
Luo Yonglong, Huang Liusheng. Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects. Journal of Computer Research and Development, 2006, 43(3): 410-416 (Pubitemid 43819179)
-
(2006)
Jisuanji Yanjiu Yu Fazhan/Computer Research and Development
, vol.43
, Issue.3
, pp. 410-416
-
-
Luo, Y.1
Huang, L.2
Jing, W.3
Xu, W.4
-
15
-
-
2942748384
-
A Protocol of Comparing Information without Leaking
-
QIN Jing, ZHANG Zhenfeng, FENG Dengguo, and LI Bao. A Protocol of Comparing Information without Leaking. Journal of Software, 2004. 15(3): 421-427
-
(2004)
Journal of Software
, vol.15
, Issue.3
, pp. 421-427
-
-
Qin, J.1
Zhang, Z.2
Feng, D.3
Li, B.4
-
16
-
-
22844441340
-
An Efficient Solution to Yao's Millionaire's Problem
-
Li Shundong, Dai Yiqi, and You Qiyou. An Efficient Solution to Yao's Millionaire's Problem. Acta Electronica Sinica, 2005, 33(5): 669-773
-
(2005)
Acta Electronica Sinica
, vol.33
, Issue.5
, pp. 669-773
-
-
Shundong, L.1
Yiqi, D.2
Qiyou, Y.3
-
18
-
-
1342345050
-
Efficient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters
-
J
-
Wen-Guey Tzeng. Efficient 1-out-of-n Oblivious Transfer Schemes with Universally Usable Parameters [J]. IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (2): 232-240
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.2
, pp. 232-240
-
-
Tzeng, W.-G.1
|