메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Privacy preserving string comparisons based on levenshtein distance

Author keywords

[No Author keywords available]

Indexed keywords

CIPHERTEXTS; CLIENT SERVER; COMMUNICATION CONSTRAINTS; EDIT DISTANCE; LEVENSHTEIN DISTANCE; PRIVACY PRESERVING; PRIVACY-PRESERVING PROTOCOLS; PRIVATE COMPUTATION; PROTOCOL OVERHEAD; SECRET SHARING; STRING COMPARISON; TWO-PARTY PROTOCOLS;

EID: 79952509877     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2010.5711449     Document Type: Conference Paper
Times cited : (29)

References (10)
  • 1
    • 0001116877 scopus 로고
    • Binary codes capable of correcting deletions, insertions, and reversals
    • Feb.
    • V. I. Levenshtein, "Binary codes capable of correcting deletions, insertions, and reversals," Soviet Physics Doklady, vol. 10, no. 8, pp. 707-710, Feb. 1966.
    • (1966) Soviet Physics Doklady , vol.10 , Issue.8 , pp. 707-710
    • Levenshtein, V.I.1
  • 3
    • 27644520949 scopus 로고    scopus 로고
    • Secure outsourcing of sequence comparisons
    • DOI 10.1007/s10207-005-0070-3
    • M. Atallah and J. Li, "Secure outsourcing of sequence comparisons," International Journal of Information Security, vol. 4, no. 4, pp. 277-287, Oct. 2005. (Pubitemid 41554602)
    • (2005) International Journal of Information Security , vol.4 , Issue.4 , pp. 277-287
    • Atallah, M.J.1    Li, J.2
  • 5
    • 34548668665 scopus 로고    scopus 로고
    • Privacy preserving clustering on horizontally partitioned data
    • DOI 10.1016/j.datak.2007.03.015, PII S0169023X0700047X
    • A. Inan, S. Kaya, Y. Saygin, E. Savas, A. Hintoglu, and A. Levi, "Privacy preserving clustering on horizontally partitioned data," Data and Knowledge Engineering, vol. 63, no. 3, pp. 646-666, Dec. 2007. (Pubitemid 47418333)
    • (2007) Data and Knowledge Engineering , vol.63 , Issue.3 , pp. 646-666
    • Inan, A.1    Kaya, S.V.2    Saygin, Y.3    Savas, E.4    Hintoglu, A.A.5    Levi, A.6
  • 6
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer-Verlag, Lecture Notes in Computer Science
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, EUROCRYPT 99. 1999, vol. 1592, pp. 233-238, Springer-Verlag, Lecture Notes in Computer Science.
    • (1999) Advances in Cryptology, EUROCRYPT 99 , vol.1592 , pp. 233-238
    • Paillier, P.1
  • 7
    • 84867553981 scopus 로고    scopus 로고
    • A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
    • Public Key Cryptography
    • th International Workshop on Practice and Theory in Public Key Cryptosystems, Cheju Island, Korea, Feb. 2001, pp. 119-136. (Pubitemid 33232937)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1992 , pp. 119-136
    • Damgard, I.1    Jurik, M.2
  • 9
    • 77951953963 scopus 로고    scopus 로고
    • Secure distortion computation in the encrypted domain using homomorphic encryption
    • Cairo, Egypt, Nov.
    • S. Rane, W. Sun, and A. Vetro, "Secure Distortion Computation in the Encrypted Domain Using Homomorphic Encryption," in Proc. IEEE International Conference on Image Processing, Cairo, Egypt, Nov. 2009, pp. 1485-1488.
    • (2009) Proc. IEEE International Conference on Image Processing , pp. 1485-1488
    • Rane, S.1    Sun, W.2    Vetro, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.