-
2
-
-
0023545076
-
How to Play any Mental Game
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play any Mental Game," in Proceedings of the 19th Symposium on Theory of Computing (STOC). ACM Press, 1987, pp. 218-229.
-
(1987)
Proceedings of the 19th Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
3
-
-
85014508412
-
Multiparty computation with faulty majority
-
New York, NY, USA: Springer-Verlag New York, Inc
-
D. Beaver and S. Goldwasser, "Multiparty computation with faulty majority," in CRYPTO '89: Proceedings on Advances in cryptology. New York, NY, USA: Springer-Verlag New York, Inc., 1989, pp. 589-590.
-
(1989)
CRYPTO '89: Proceedings on Advances in cryptology
, pp. 589-590
-
-
Beaver, D.1
Goldwasser, S.2
-
4
-
-
0026367257
-
FaultTolerant Computation in the Full Information Model
-
O. Goldriech, S. Goldwasser, and N. Linial, "FaultTolerant Computation in the Full Information Model," in Proceedings of 32nd IEEE Symposium on Foundations of Computer Science (FOCS), 1991, pp. 447-457.
-
(1991)
Proceedings of 32nd IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 447-457
-
-
Goldriech, O.1
Goldwasser, S.2
Linial, N.3
-
5
-
-
84898960610
-
Completeness Theorems for Non-cryptographic Faulttolerant Distributed Computation
-
ACM Press
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness Theorems for Non-cryptographic Faulttolerant Distributed Computation," in Proceedings of the 20th Symposium on Theory of Computing (STOC). ACM Press, 1988, pp. 1-10.
-
(1988)
Proceedings of the 20th Symposium on Theory of Computing (STOC)
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84957717648
-
Efficient Multi-party Computations Secure Against an Adaptive Adversary
-
Proceedings of Advances in Crytology-EUROCRYPT '99
-
R. Cramer, I. Damgard, S. Dziembowski, M. Hirt, and T. Rabin, "Efficient Multi-party Computations Secure Against an Adaptive Adversary," in Proceedings of Advances in Crytology-EUROCRYPT '99, ser. Lecture Notes in Computer Science (LNCS), vol. 1592, 1999, pp. 311-326.
-
(1999)
ser. Lecture Notes in Computer Science (LNCS
, vol.1592
, pp. 311-326
-
-
Cramer, R.1
Damgard, I.2
Dziembowski, S.3
Hirt, M.4
Rabin, T.5
-
8
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer, "Player simulation and general adversary structures in perfect multiparty computation," Journal of Cryptology, vol. 13, pp. 31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
9
-
-
0041783510
-
Privacy-preserving data mining
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," SIGMOD Rec., vol. 29, no. 2, pp. 439-450, 2000.
-
(2000)
SIGMOD Rec
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
10
-
-
33646793331
-
Privacy-preserving graph algorithms in the semi-honest model
-
J. Brickell and V. Shmatikov, "Privacy-preserving graph algorithms in the semi-honest model," in ASIACRYPT, 2005, pp. 236-252.
-
(2005)
ASIACRYPT
, pp. 236-252
-
-
Brickell, J.1
Shmatikov, V.2
-
11
-
-
0034820931
-
-
W. Du and M. J. Atallah, Privacy-preserving cooperative scientific computations, in In 14th IEEE Computer Security Foundations Workshop, 2001, pp. 273-282.
-
W. Du and M. J. Atallah, "Privacy-preserving cooperative scientific computations," in In 14th IEEE Computer Security Foundations Workshop, 2001, pp. 273-282.
-
-
-
-
12
-
-
38049089776
-
Privacy-preserving set union
-
K. B. Frikken, "Privacy-preserving set union," in ACNS, 2007, pp. 237-252.
-
(2007)
ACNS
, pp. 237-252
-
-
Frikken, K.B.1
-
13
-
-
1642265952
-
Privacy preserving electronic surveillance
-
New York, NY, USA: ACM
-
K. B. Frikken and M. J. Atallah, "Privacy preserving electronic surveillance," in WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM, 2003, pp. 45-52.
-
(2003)
WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
, pp. 45-52
-
-
Frikken, K.B.1
Atallah, M.J.2
-
14
-
-
84927517111
-
-
W. Du and M. J. Atallah, Privacy-preserving cooperative statistical analysis, in In Proceedings of the 17th Annual Computer Security Applications Conference, 2001, pp. 102-110.
-
W. Du and M. J. Atallah, "Privacy-preserving cooperative statistical analysis," in In Proceedings of the 17th Annual Computer Security Applications Conference, 2001, pp. 102-110.
-
-
-
-
15
-
-
49049084899
-
Privacy preserving shortest path computation in presence of convex polygonal obstacles
-
Washington, DC, USA: IEEE Computer Society
-
A. S. Das, J. K. Keshri, K. Srinathan, and V. Srivastava, "Privacy preserving shortest path computation in presence of convex polygonal obstacles," in ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security. Washington, DC, USA: IEEE Computer Society, 2008, pp. 446-451.
-
(2008)
ARES '08: Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
, pp. 446-451
-
-
Das, A.S.1
Keshri, J.K.2
Srinathan, K.3
Srivastava, V.4
-
16
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
W. Du and M. J. Atallah, "Secure multi-party computation problems and their applications: A review and open problems," in In New Security Paradigms Workshop, 2001, pp. 11-20.
-
(2001)
In New Security Paradigms Workshop
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
17
-
-
70349672673
-
-
T. Thomas, Secure two-party protocols for point inclusion problem, CoRR, abs/0705.4185, 2007.
-
T. Thomas, "Secure two-party protocols for point inclusion problem," CoRR, vol. abs/0705.4185, 2007.
-
-
-
-
18
-
-
0014705383
-
An algorithm for convex polytopes
-
D. R. Chand and S. S. Kapur, "An algorithm for convex polytopes," J. ACM, vol. 17, no. 1, pp. 78-86, 1970.
-
(1970)
J. ACM
, vol.17
, Issue.1
, pp. 78-86
-
-
Chand, D.R.1
Kapur, S.S.2
-
19
-
-
0015599132
-
On the identification of the convex hull of a finite set of points in the plane
-
R. Jarvis, "On the identification of the convex hull of a finite set of points in the plane," IPL, vol. 2, pp. 18-21, 1973.
-
(1973)
IPL
, vol.2
, pp. 18-21
-
-
Jarvis, R.1
-
20
-
-
49649136358
-
An efficient algorithm for determining the convex hull of a finite planar set
-
R. L. Graham, "An efficient algorithm for determining the convex hull of a finite planar set," Inf. Process. Lett., vol. 1, no. 4, pp. 132-133, 1972.
-
(1972)
Inf. Process. Lett
, vol.1
, Issue.4
, pp. 132-133
-
-
Graham, R.L.1
-
21
-
-
0030490026
-
Optimal output-sensitive convex hull algorithms in two and three dimensions
-
T. M. Chan, "Optimal output-sensitive convex hull algorithms in two and three dimensions," Discrete & Computational Geometry, vol. 16, pp. 361-368, 1996.
-
(1996)
Discrete & Computational Geometry
, vol.16
, pp. 361-368
-
-
Chan, T.M.1
-
22
-
-
49049100722
-
Privacy-preserving protocols for finding the convex hulls
-
Q. Wang, Y. Luo, and L. Huang, "Privacy-preserving protocols for finding the convex hulls," in ARES, 2008, pp. 727-732.
-
(2008)
ARES
, pp. 727-732
-
-
Wang, Q.1
Luo, Y.2
Huang, L.3
|