-
1
-
-
0002908662
-
A generalisation, a simplification and some applications of pailliers probabilistic public-key system
-
Springer
-
I. Damgard and M. Jurik. A Generalisation, a Simplification and Some Applications of Pailliers Probabilistic Public-Key System, In Public Key Cryptography 2001. Springer, 2001.
-
(2001)
Public Key Cryptography 2001
-
-
Damgard, I.1
Jurik, M.2
-
3
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Seoul, Korea
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, On private scalar product computation for privacy-preserving data mining, The 7th Annual International Conference in Information Security and Cryptology, Seoul, Korea, 2004, pp. 104-120.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
4
-
-
0003979335
-
-
Basic Applications., Cambridge University Press, Cambridge
-
O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications., Cambridge University Press, Cambridge, 2004.
-
(2004)
Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
5
-
-
77951192010
-
Accurate estimation of the degree distribution of private networks
-
M. Hay, C. Li, G. Miklau, and D. Jensen, Accurate estimation of the degree distribution of private networks, The 9th IEEE International Conference on Data Mining, 2009.
-
(2009)
The 9th IEEE International Conference on Data Mining
-
-
Hay, M.1
Li, C.2
Miklau, G.3
Jensen, D.4
-
8
-
-
33750696648
-
Learning systems of concepts with an infinite relational model
-
C. Kemp, J. B. Tenenbaum, T. L. Griffiths, T. Yamada, and N. Ueda, Learning systems of concepts with an infinite relational model, The 21st National Conference on Artificial Intelligence, 2006.
-
(2006)
The 21st National Conference on Artificial Intelligence
-
-
Kemp, C.1
Tenenbaum, J.B.2
Griffiths, T.L.3
Yamada, T.4
Ueda, N.5
-
10
-
-
84857180437
-
-
V. Krebs, http://www.orgnet.com/.
-
-
-
Krebs, V.1
-
11
-
-
19744365747
-
Privacy-preserving clustering with distributed em mixture
-
X. Lin, C. Clifton, and M. Zhu, Privacy-preserving clustering with distributed EM mixture, Knowledge and information systems, 2004, pp. 68-81.
-
(2004)
Knowledge and Information Systems
, pp. 68-81
-
-
Lin, X.1
Clifton, C.2
Zhu, M.3
-
13
-
-
85084163840
-
Fairplay: A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, Fairplay: a secure two-party computation system, USENIX Security Symposium, 2004. pp. 287-302.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
14
-
-
34547405111
-
Mixture models and exploratory analysis in networks
-
M. E. J. Newman and E. A. Leicht, Mixture models and exploratory analysis in networks, PNAS, 2007.
-
(2007)
PNAS
-
-
Newman, M.E.J.1
Leicht, E.A.2
-
15
-
-
0000277371
-
Public-key cryptosystems based on composite degree residue classes
-
P. Paillier, Public-Key Cryptosystems based on Composite Degree Residue Classes, Proceedings of EuroCrypt '99, 1999.
-
(1999)
Proceedings of EuroCrypt '99
-
-
Paillier, P.1
-
18
-
-
0002935868
-
On an estimate of the chromatic class of a p-graph
-
V. G. Vizing, On an estimate of the chromatic class of a p-graph, Diskret. Analiz. 3: 25-30, 1964.
-
(1964)
Diskret. Analiz.
, vol.3
, pp. 25-30
-
-
Vizing, V.G.1
|