메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 190-209

Point-based trust: Define how much privacy is worth

Author keywords

Knapsack problem; Private multi party computation; Trust management

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 78349255568     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_14     Document Type: Conference Paper
Times cited : (21)

References (46)
  • 5
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • P. A.Bonatti and P.Samarati.A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3):241–272, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.A.1    Samarati, P.2
  • 9
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R.Canetti.Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143–202, 2000.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 10
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D.Chaum.Security without identification: transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, October1985.
    • (1985) Communications of the ACM , vol.28 October , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 12
    • 79251590715 scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations
    • D.Chaum and J.-H.Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Proceedings of Advances in cryptology— CRYPTO’86, pages 118–167, January 1987.
    • (1987) Proceedings of Advances in cryptology— CRYPTO’86 , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 14
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Springer, Dec
    • C.Cocks. An identity based encryption scheme based on quadratic residues. In 8th IMA International Conference on Cryptography and Coding, volume 2260, pages 360–363. Springer, Dec. 2001.
    • (2001) 8Th IMA International Conference on Cryptography and Coding , vol.2260 , pp. 360-363
    • Cocks, C.1
  • 33
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable homomorphic oblivious transfer and private equality test
    • H.Lipmaa. Verifiable homomorphic oblivious transfer and private equality test. In Advances in Cryptology — Asiacrypt’03, LNCS, pages 416–433, 2003.
    • (2003) Advances in Cryptology — Asiacrypt’03, LNCS , pp. 416-433
    • Lipmaa, H.1
  • 34
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P.Paillier. Public-key cryptosystems based on composite degree residuosity classes. Advances in Cryptology – EUROCRYPT 1999, LNCS1592:223–238, 1999.
    • (1999) Advances in Cryptology – EUROCRYPT 1999, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 42
    • 85025690907 scopus 로고    scopus 로고
    • Privacy-preserving computation of trust with application to fuzzy location queries, March 2006
    • D.Yao, R.Tamassia, and S.Proctor. Privacy-preserving computation of trust with application to fuzzy location queries, March 2006. Brown University Technical Report.
    • Brown University Technical Report.
    • Yao, D.1    Tamassia, R.2    Proctor, S.3
  • 44
    • 84954418287 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society Press, May
    • T.Yu and M.Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110–122. IEEE Computer Society Press, May2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.