-
1
-
-
84870504149
-
A new efficient privacy-preserving scalar product protocol
-
Gold Coast, Queensland, Australia, December 3-4
-
Amirbekyan A, Estivill-Castro V (2007) A new efficient privacy-preserving scalar product protocol. In: Proceedings of the 6th Australasian conference on data mining and analytics, pp 209-214, Gold Coast, Queensland, Australia, December 3-4
-
(2007)
Proceedings of the 6th Australasian Conference on Data Mining and Analytics
, pp. 209-214
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
2
-
-
0030679850
-
Commodity-based cryptography (extended abstract)
-
El Paso, TX, USA, May 4-6
-
Beaver D (1997) Commodity-based cryptography (extended abstract). In: Proceedings of the 29th annual ACM symposium on theory of computing, pp 446-455, El Paso, TX, USA, May 4-6
-
(1997)
Proceedings of the 29th Annual ACM Symposium on Theory of Computing
, pp. 446-455
-
-
Beaver, D.1
-
3
-
-
84986251750
-
Server-assisted cryptography
-
Charlottesville, VA, USA, September 22-26
-
Beaver D (1998) Server-assisted cryptography. In: Proceedings of the 1998 workshop on new security paradigms, pp 92-106, Charlottesville, VA, USA, September 22-26
-
(1998)
Proceedings of the 1998 Workshop on New Security Paradigms
, pp. 92-106
-
-
Beaver, D.1
-
4
-
-
33646508997
-
A Tight lower bound for restricted pir protocols
-
DOI 10.1007/s00037-006-0208-3
-
R Beigel L Fortnow W Gasarch 2006 A nearly tight lower bound for restricted private information retrieval protocols Comput Complex 15 1 82 91 1099.68035 10.1007/s00037-006-0208-3 2226071 (Pubitemid 43706827)
-
(2006)
Computational Complexity
, vol.15
, Issue.1
, pp. 82-91
-
-
Beigel, R.1
Fortnow, L.2
Gasarch, W.3
-
5
-
-
54249090811
-
A single initialization server for multi-party cryptography
-
10.1007/978-3-540-85093-9-8
-
H Blier A Tapp 2008 A single initialization server for multi-party cryptography Lect Notes Comput Sci 5155 71 85 10.1007/978-3-540-85093-9-8
-
(2008)
Lect Notes Comput Sci
, vol.5155
, pp. 71-85
-
-
Blier, H.1
Tapp, A.2
-
6
-
-
32844467091
-
Structural hidden Markov models using a relation of equivalence: Application to automotive designs
-
DOI 10.1007/s10618-005-0020-8
-
D Bouchaffra J Tan 2006 Structural hidden Markov models using a relation of equivalence: application to automotive designs Data Min Knowl Discov 12 1 79 96 10.1007/s10618-005-0020-8 2225528 (Pubitemid 43255932)
-
(2006)
Data Mining and Knowledge Discovery
, vol.12
, Issue.1
, pp. 79-96
-
-
Bouchaffra, D.1
Tan, J.2
-
7
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology: EUROCRYPT '99
-
10.1007/3-540-48910-X-28
-
C Cachin S Micali M Stadler 1999 Computationally private information retrieval with polylogarithmic communication. Advances in Cryptology: EUROCRYPT '99 Lect Notes Comput Sci 1592 402 414 10.1007/3-540-48910-X-28
-
(1999)
Lect Notes Comput Sci
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
0034782679
-
Selective private function evaluation with applications to private statistics (extended abstract)
-
Newport, RI, USA, August 26-29
-
Canetti R, Ishai Y, Kumar R, Reiter MK, Rubinfeld R, Wright RN (2001) Selective private function evaluation with applications to private statistics (extended abstract). In: Proceedings of 20th Annual ACM Symposium on Principles of Distributed Computing, pp 293-304, Newport, RI, USA, August 26-29
-
(2001)
Proceedings of 20th Annual ACM Symposium on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
9
-
-
0032201622
-
Private information retrieval
-
1065.68524 10.1145/293347.293350 1678848
-
B Chor O Goldreich E Kushilevitz M Sudan 1998 Private information retrieval J ACM 45 6 965 982 1065.68524 10.1145/293347.293350 1678848
-
(1998)
J ACM
, vol.45
, Issue.6
, pp. 965-982
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
10
-
-
54249132643
-
Statistical security conditions for two-party secure function evaluation
-
10.1007/978-3-540-85093-9-9
-
C Crépeau J Wullschleger 2008 Statistical security conditions for two-party secure function evaluation Lect Notes Comput Sci 5155 86 99 10.1007/978-3-540-85093-9-9
-
(2008)
Lect Notes Comput Sci
, vol.5155
, pp. 86-99
-
-
Crépeau, C.1
Wullschleger, J.2
-
11
-
-
56749102679
-
Peer-to-peer private information retrieval
-
10.1007/978-3-540-87471-3-26
-
J Domingo-Ferrer M Bras-Amorós 2008 Peer-to-peer private information retrieval Lect Notes Comput Sci 5262 315 323 10.1007/978-3-540- 87471-3-26
-
(2008)
Lect Notes Comput Sci
, vol.5262
, pp. 315-323
-
-
Domingo-Ferrer, J.1
Bras-Amorós, M.2
-
14
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Dallas, TX, USA, May 24-26
-
Gertner Y, Ishai Y, Kushilevitz E, Malkin T (1998) Protecting data privacy in private information retrieval schemes. In: Proceedings of the 30th annual ACM symposium on theory of computing, Dallas, TX, USA, May 24-26
-
(1998)
Proceedings of the 30th Annual ACM Symposium on Theory of Computing
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
16
-
-
0023545076
-
How to play any mental game
-
New York, NY, USA, May 25-27
-
Goldreich O, Micali S, Wigderson A (1987) How to play any mental game. In: Proceedings of the 19th annual ACM symposium on theory of computing, pp 218-229, New York, NY, USA, May 25-27
-
(1987)
Proceedings of the 19th Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
17
-
-
0030689525
-
Multi-party computations: Past and present
-
Santa Barbara, CA, USA, August 21-24
-
Goldwasser S (1997) Multi-party computations: past and present. In: Proceedings of the 16th annual ACM symposium on principles of distributed computing, pp 1-6, Santa Barbara, CA, USA, August 21-24
-
(1997)
Proceedings of the 16th Annual ACM Symposium on Principles of Distributed Computing
, pp. 1-6
-
-
Goldwasser, S.1
-
18
-
-
40249094508
-
A linear lower bound on the communication complexity of single-server private information retrieval
-
10.1007/978-3-540-78524-8-25 2494156
-
I Haitner JJ Hoch G Segev 2008 A linear lower bound on the communication complexity of single-server private information retrieval Lect Notes Comput Sci 4948 445 464 10.1007/978-3-540-78524-8-25 2494156
-
(2008)
Lect Notes Comput Sci
, vol.4948
, pp. 445-464
-
-
Haitner, I.1
Hoch, J.J.2
Segev, G.3
-
20
-
-
77953604043
-
Road sign detection and recognition using hidden Markov model
-
J Hsien Y Liou S Chen 2006 Road sign detection and recognition using hidden Markov model Asian J Health Inf Sci 1 1 85 100
-
(2006)
Asian J Health Inf Sci
, vol.1
, Issue.1
, pp. 85-100
-
-
Hsien, J.1
Liou, Y.2
Chen, S.3
-
21
-
-
48249157833
-
Low-computation oblivious transfer scheme for private information retrieval
-
2478517
-
HF Huang CC Chang 2008 Low-computation oblivious transfer scheme for private information retrieval Int J Innov Comput Inf Control 4 6 1365 1370 2478517
-
(2008)
Int J Innov Comput Inf Control
, vol.4
, Issue.6
, pp. 1365-1370
-
-
Huang, H.F.1
Chang, C.C.2
-
22
-
-
84969524054
-
An efficient protocol for Yaos millionaires problem
-
Big Island, HI, USA January 6-9
-
Ioannidis I, Grama A (2003) An efficient protocol for Yaos millionaires problem. In: Proceedings of the 36th Hawaii international conference on system sciences. Big Island, HI, USA, pp 6-9, January 6-9
-
(2003)
Proceedings of the 36th Hawaii International Conference on System Sciences
, pp. 6-9
-
-
Ioannidis, I.1
Grama, A.2
-
23
-
-
1842610660
-
Quantum symmetrically-private information retrieval
-
1177.68081 10.1016/j.ipl.2004.02.003
-
I Kerenidis R Wolf 2004 Quantum symmetrically-private information retrieval Inf Process Lett 90 3 109 114 1177.68081 10.1016/j.ipl.2004.02.003
-
(2004)
Inf Process Lett
, vol.90
, Issue.3
, pp. 109-114
-
-
Kerenidis, I.1
Wolf, R.2
-
24
-
-
54249097947
-
A practical universal circuit construction and secure evaluation of private functions
-
10.1007/978-3-540-85230-8-7
-
V Kolesnikov T Schneider 2008 A practical universal circuit construction and secure evaluation of private functions Lect Notes Comput Sci 5143 83 97 10.1007/978-3-540-85230-8-7
-
(2008)
Lect Notes Comput Sci
, vol.5143
, pp. 83-97
-
-
Kolesnikov, V.1
Schneider, T.2
-
25
-
-
34547335279
-
Secure function evaluation with ordered binary decision diagrams
-
Alexandria, VA, USA October 30-November 3
-
Kruger L, Jha S, Goh E, Boneh D (2006) Secure function evaluation with ordered binary decision diagrams. In: Proceedings of the 13th ACM conference on computer and communications security. Alexandria, VA, USA, pp 410-420, October 30-November 3
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 410-420
-
-
Kruger, L.1
Jha, S.2
Goh, E.3
Boneh, D.4
-
26
-
-
38149125521
-
Accredited symmetrically private information retrieval
-
10.1007/978-3-540-75651-4-18
-
M Layouni 2007 Accredited symmetrically private information retrieval Lect Notes Comput Sci 4752 262 277 10.1007/978-3-540-75651-4-18
-
(2007)
Lect Notes Comput Sci
, vol.4752
, pp. 262-277
-
-
Layouni, M.1
-
27
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
10.1007/978-3-540-72540-4-4 2449203
-
Y Lindell B Pinkas 2007 An efficient protocol for secure two-party computation in the presence of malicious adversaries Lect Notes Comput Sci 4515 52 78 10.1007/978-3-540-72540-4-4 2449203
-
(2007)
Lect Notes Comput Sci
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
28
-
-
56649091142
-
New communication-efficient oblivious transfer protocols based on pairings
-
10.1007/978-3-540-85886-7-30
-
H Lipmaa 2008 New communication-efficient oblivious transfer protocols based on pairings Lect Notes Comput Sci 5222 441 454 10.1007/978-3-540-85886-7- 30
-
(2008)
Lect Notes Comput Sci
, vol.5222
, pp. 441-454
-
-
Lipmaa, H.1
-
29
-
-
29244457240
-
Secure multi-party computation made simple
-
DOI 10.1016/j.dam.2005.03.020, PII S0166218X05002428
-
U Maurer 2006 Secure multi-party computation made simple Discret Appl Math 154 2 370 381 1091.94035 10.1016/j.dam.2005.03.020 2194409 (Pubitemid 41827525)
-
(2006)
Discrete Applied Mathematics
, vol.154
, Issue.2
, pp. 370-381
-
-
Maurer, U.1
-
30
-
-
33746918412
-
Learning nonsingular phylogenies and hidden Markov models
-
DOI 10.1214/105051606000000024
-
E Mossel S Roch 2006 Learning nonsingular phylogenies and hidden Markov models Ann Appl Probab 16 2 583 614 1137.60034 10.1214/105051606000000024 2244426 (Pubitemid 44196526)
-
(2006)
Annals of Applied Probability
, vol.16
, Issue.2
, pp. 583-614
-
-
Mossel, E.1
Roch, S.2
-
31
-
-
0032669864
-
Oblivious transfer and polynomial evaluation (extended abstract)
-
Atanta, GA, USA May 1-4
-
Naor M, Pinkas B (1999) Oblivious transfer and polynomial evaluation (extended abstract). In: Proceedings of the 31st ACM symposium on theory of computing. Atanta, GA, USA, pp 245-254, May 1-4
-
(1999)
Proceedings of the 31st ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
32
-
-
67651017547
-
Occam and Bayes in predicting category intuitiveness
-
10.1007/s10462-009-9102-0
-
EM Pothos 2009 Occam and Bayes in predicting category intuitiveness Artif Intell Rev 28 3 257 274 10.1007/s10462-009-9102-0
-
(2009)
Artif Intell Rev
, vol.28
, Issue.3
, pp. 257-274
-
-
Pothos, E.M.1
-
33
-
-
59649104116
-
Querying pathways in protein interaction networks based on hidden Markov models
-
10.1089/cmb.2008.02TT 2487545
-
X Qian S Sze B Yoon 2009 Querying pathways in protein interaction networks based on hidden Markov models J Comput Biol 16 2 145 157 10.1089/cmb.2008.02TT 2487545
-
(2009)
J Comput Biol
, vol.16
, Issue.2
, pp. 145-157
-
-
Qian, X.1
Sze, S.2
Yoon, B.3
-
35
-
-
68549133148
-
Providing predictions on distributed HMMs with privacy
-
10.1007/s10462-009-9106-9
-
S Renckes H Polat Y Oysal 2008 Providing predictions on distributed HMMs with privacy Artif Intell Rev 28 4 343 362 10.1007/s10462-009-9106-9
-
(2008)
Artif Intell Rev
, vol.28
, Issue.4
, pp. 343-362
-
-
Renckes, S.1
Polat, H.2
Oysal, Y.3
-
36
-
-
43449102012
-
Hidden Markov models for the assessment of chromosomal alterations using high-throughput SNP arrays
-
05591294 2524352
-
RB Scharpf G Parmigiani J Pevsner I Ruczinski 2008 Hidden Markov models for the assessment of chromosomal alterations using high-throughput SNP arrays Ann Appl Probab 2 2 687 713 05591294 2524352
-
(2008)
Ann Appl Probab
, vol.2
, Issue.2
, pp. 687-713
-
-
Scharpf, R.B.1
Parmigiani, G.2
Pevsner, J.3
Ruczinski, I.4
-
38
-
-
33748149905
-
Mining free-structured information based on hidden Markov models
-
DOI 10.1016/j.eswa.2005.11.022, PII S0957417405003118
-
B Tso PY Chang 2007 Mining free-structured information based on hidden Markov models Expert Syst Appl 32 1 97 102 10.1016/j.eswa.2005.11.022 (Pubitemid 44311468)
-
(2007)
Expert Systems with Applications
, vol.32
, Issue.1
, pp. 97-102
-
-
Tso, B.1
Chang, P.Y.2
-
40
-
-
51349148387
-
Towards empirical aspects of secure scalar product
-
Busan, Korea April 24-26
-
Wang IC, Shen CH, Hsu TS, Liao CC, Wang DW, Zhan J (2008) Towards empirical aspects of secure scalar product. In: Proceedings of the 2008 international conference on information security and assurance. Busan, Korea, pp 573-578, April 24-26
-
(2008)
Proceedings of the 2008 International Conference on Information Security and Assurance
, pp. 573-578
-
-
Wang, I.C.1
Shen, C.H.2
Hsu, T.S.3
Liao, C.C.4
Wang, D.W.5
Zhan, J.6
-
41
-
-
53849129991
-
Detecting LTR structures in human genomic sequences using profile hidden Markov models
-
10.1016/j.eswa.2007.10.045
-
LC Wu HD Huang YC Chang YC Lee JT Horng 2009 Detecting LTR structures in human genomic sequences using profile hidden Markov models Expert Syst Appl 36 668 674 10.1016/j.eswa.2007.10.045
-
(2009)
Expert Syst Appl
, vol.36
, pp. 668-674
-
-
Wu, L.C.1
Huang, H.D.2
Chang, Y.C.3
Lee, Y.C.4
Horng, J.T.5
-
42
-
-
33646358700
-
Experimental analysis of a privacy-preserving scalar product protocol
-
Z Yang RN Wright H Subramaniam 2006 Experimental analysis of a privacy-preserving scalar product protocol Int J Comput Syst Sci Eng 21 1 47 52
-
(2006)
Int J Comput Syst Sci Eng
, vol.21
, Issue.1
, pp. 47-52
-
-
Yang, Z.1
Wright, R.N.2
Subramaniam, H.3
-
44
-
-
38149103408
-
Visual speech recognition using motion features and hidden Markov models
-
10.1007/978-3-540-74272-2-103
-
WC Yau DK Kumar H Weghorn 2007 Visual speech recognition using motion features and hidden Markov models Lect Notes Comput Sci 4673 832 839 10.1007/978-3-540-74272-2-103
-
(2007)
Lect Notes Comput Sci
, vol.4673
, pp. 832-839
-
-
Yau, W.C.1
Kumar, D.K.2
Weghorn, H.3
-
45
-
-
58149496207
-
A hidden Markov model-based text classification of medical documents
-
10.1177/0165551508092257
-
K Yi J Beheshti 2009 A hidden Markov model-based text classification of medical documents J Inf Sci 35 1 67 81 10.1177/0165551508092257
-
(2009)
J Inf Sci
, vol.35
, Issue.1
, pp. 67-81
-
-
Yi, K.1
Beheshti, J.2
|