-
2
-
-
20444449548
-
Secure multi-party computation
-
[Online]. Available
-
O. Goldreich, "Secure multi-party computation," Working Draft, 2000. [Online]. Available: citeseer.ist.psu.edu/goldreich98secure.html.
-
(2000)
Working Draft
-
-
Goldreich, O.1
-
3
-
-
77952332120
-
Privacy preserving kmeans clustering over vertically partitioned data
-
[Online]. Available
-
J. Vaidya and C. Clifton, "Privacy preserving kmeans clustering over vertically partitioned data," in ACM SIGKDD Conf on Knowledge Discovery and Data Mining, 2003. [Online]. Available: citeseer.ist.psu.edu/ vaidya03privacypreserving.html.
-
(2003)
ACM SIGKDD Conf on Knowledge Discovery and Data Mining
-
-
Vaidya, J.1
Clifton, C.2
-
4
-
-
24144477856
-
Secure computation of the mean and related statistics
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
E. Kiltz, G. Leander, and J. Malone-Lee, "Secure computation of the mean and related statistics," in Proceedings of the Theory of Cryptography Conference, ser. Lecture Notes in Computer Science, vol. 3378, 2005, pp. 283-302. [Online]. Available: http://eprint.iacr.org/2004/359.pdf. (Pubitemid 41231170)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 283-302
-
-
Kiltz, E.1
Leander, G.2
Malone-Lee, J.3
-
5
-
-
37648998755
-
Blind vision
-
[Online]. Available
-
S. Avidan and M. Butman, "Blind vision," in ECCV, 2006. [Online]. Available: http://www.merl.com/reports/docs/TR2006-006.pdf.
-
(2006)
ECCV
-
-
Avidan, S.1
Butman, M.2
-
6
-
-
69949163699
-
Privacy-preserving face recognition
-
ser. LNCS, E. Goldberg and M. Atallah, Eds. Springer
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Privacy Enhancing Technologies, ser. LNCS, E. Goldberg and M. Atallah, Eds. Springer, 2009, vol. 5672.
-
(2009)
Privacy Enhancing Technologies
, vol.5672
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
7
-
-
77955178939
-
SCiFI: A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich, "SCiFI: A System for Secure Face Identification," in IEEE Symposium on Security and Privacy, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
8
-
-
33947652084
-
Secure sound classification: Gaussian mixture models
-
[Online], Available
-
M. Shashanka and P. Smaragdis, "Secure sound classification: Gaussian mixture models," in Proc. of ICASSP, 2006. [Online]. Available: http://www.merl.com/reports/docs/TR2006-065.pdf.
-
(2006)
Proc. of ICASSP
-
-
Shashanka, M.1
Smaragdis, P.2
-
10
-
-
50249135964
-
A framework for secure speech recognition
-
P. Smaragdis and M. Shashanka, "A framework for secure speech recognition," IEEE Trans. on Audio, Speech and Language Proc., vol. 15, no. 4, pp. 1404-1413, 2007.
-
(2007)
IEEE Trans. on Audio, Speech and Language Proc.
, vol.15
, Issue.4
, pp. 1404-1413
-
-
Smaragdis, P.1
Shashanka, M.2
-
11
-
-
77954761667
-
Additive conditional disclosure of secrets and applications
-
[Online], Available: citeseer.ist.psu.edu/laur05additive.html
-
S. Laur and H. Lipmaa, "Additive conditional disclosure of secrets and applications," Cryptology ePrint Archive, Report 2005/378, 2005, http://eprint.iacr.org/. [Online]. Available: citeseer.ist.psu.edu/ laur05additive.html.
-
(2005)
Cryptology EPrint Archive, Report 2005/378
-
-
Laur, S.1
Lipmaa, H.2
-
12
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
ser. Lecture Notes in Computer Science, J. Stern, Ed., [Online], Available
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proceedings of Advances in Cryptology - EUROCRYPT'99, ser. Lecture Notes in Computer Science, J. Stern, Ed., vol. 1592, 1999, pp. 223-238. [Online]. Available: citeseer.ist.psu.edu/ paillier99publickey.html.
-
(1999)
Proceedings of Advances in Cryptology - EUROCRYPT'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
13
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
I. Damgard and M. Jurik, "A generalisation, simplification and some applications of paillier's probabilistic public-key system," in Proceedings of the Intl. Workshop on Practice and Theory in Public Key Cryptography, ser. Lecture Notes in Computer Science, vol. 1992, 2001, pp. 119-136. [Online]. Available: http://citeseer.ist.psu.edu/383099.html. (Pubitemid 33232937)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
14
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
ser. Lecture Notes in Computer Science, C. Park and S. Chee, Eds., [Online], Available
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On private scalar product computation for privacy-preserving data mining," in Intl. Conference on Information Security and Cryptology, ser. Lecture Notes in Computer Science, C. Park and S. Chee, Eds., vol. 2506, 2004, pp. 104-120. [Online]. Available: http://citeseer.ist.psu.edu/goethals04private.html.
-
(2004)
Intl. Conference on Information Security and Cryptology
, vol.2506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
15
-
-
84946847417
-
Oblivious polynomial evaluation and oblivious neural learning
-
ser. Lecture Notes in Computer Science, [Online]. Available
-
Y.-C. Chang and C.-J. Lu, "Oblivious polynomial evaluation and oblivious neural learning," in Advances in Cryptology, Asiacrypt'01, ser. Lecture Notes in Computer Science, vol. 2248, 2001, pp. 369-384. [Online]. Available: citeseer.ist.psu.edu/chang01oblivious.html.
-
(2001)
Advances in Cryptology, Asiacrypt'01
, vol.2248
, pp. 369-384
-
-
Chang, Y.-C.1
Lu, C.-J.2
-
16
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
Virginia Beach, virginia, USA, September 23-26, [Online], Available
-
W. Du and Z. Zhan, "A practical approach to solve secure multi-party computation problems," in Proceedings of New Security Paradigms Workshop, Virginia Beach, virginia, USA, September 23-26 2002. [Online]. Available: citeseer.ist.psu.edu/du02practical.html.
-
(2002)
Proceedings of New Security Paradigms Workshop
-
-
Du, W.1
Zhan, Z.2
-
17
-
-
1642327704
-
Secure and private sequence comparisons
-
Washington, DC, USA, October, [Online], Available
-
M. J. Atallah, F. Kerschbaum, and W. Du, "Secure and private sequence comparisons," in Proceedings of Workshop on Privacy in the Electronic Society, Washington, DC, USA, October 2003. [Online]. Available: http://citeseer.ist.psu.edu/atallah03secure.html.
-
(2003)
Proceedings of Workshop on Privacy in the Electronic Society
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
|