메뉴 건너뛰기




Volumn , Issue , 2012, Pages

Knowledge-oriented secure multiparty computation

Author keywords

D.2.0 Software Engineering : Protection Mechanisms; Language; Security

Indexed keywords

KNOWLEDGE-ORIENTED; LANGUAGE; PROTECTION MECHANISMS; SECURE MULTI-PARTY COMPUTATION; SECURITY; TRACKING METHOD;

EID: 84865295525     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2336717.2336719     Document Type: Conference Paper
Times cited : (15)

References (12)
  • 1
    • 51849137365 scopus 로고    scopus 로고
    • Distributed private data analysis: Simultaneously solving how and what
    • Advances in Cryptology - Crypto 2008, Springer
    • Amos Beimel, Kobbi Nissim, and Eran Omri. Distributed private data analysis: Simultaneously solving how and what. In Advances in Cryptology - Crypto 2008, volume 5157 of LNCS, pages 451-468. Springer, 2008.
    • (2008) LNCS , vol.5157 , pp. 451-468
    • Beimel, A.1    Nissim, K.2    Omri, E.3
  • 3
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • 33rd Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, Springer
    • Cynthia Dwork. Differential privacy. In 33rd Intl. Colloquium on Automata, Languages, and Programming (ICALP), Part II, volume 4052 of LNCS, pages 1-12. Springer, 2006.
    • (2006) LNCS , vol.4052 , pp. 1-12
    • Dwork, C.1
  • 4
    • 33746037200 scopus 로고    scopus 로고
    • Our data, ourselves: Privacy via distributed noise generation
    • Advances in Cryptology - Eurocrypt 2006, Springer
    • Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. Our data, ourselves: Privacy via distributed noise generation. In Advances in Cryptology - Eurocrypt 2006, volume 4004 of LNCS, pages 486-503. Springer, 2006.
    • (2006) LNCS , vol.4004 , pp. 486-503
    • Dwork, C.1    Kenthapadi, K.2    McSherry, F.3    Mironov, I.4    Naor, M.5
  • 5
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • 3rd Theory of Cryptography Conference - TCC 2006, Springer
    • Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In 3rd Theory of Cryptography Conference - TCC 2006, volume 3876 of LNCS, pages 265-284. Springer, 2006.
    • (2006) LNCS , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 6
    • 78649820323 scopus 로고    scopus 로고
    • Basic Applications
    • Cambridge University Press, Cambridge, UK
    • O. Goldreich. Foundations of Cryptography, vol. 2: Basic Applications. Cambridge University Press, Cambridge, UK, 2004.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 8
    • 84914127581 scopus 로고    scopus 로고
    • Faster secure two-party computation using garbled circuits
    • Yan Huang, David Evans, Jonathan Katz, and Lior Malka. Faster secure two-party computation using garbled circuits. In USENIX Security, 2011.
    • (2011) USENIX Security
    • Huang, Y.1    Evans, D.2    Katz, J.3    Malka, L.4
  • 10
    • 78049357399 scopus 로고    scopus 로고
    • Secure multiparty computation for privacy-preserving data mining
    • Y. Lindell and B. Pinkas. Secure multiparty computation for privacy-preserving data mining. J. Privacy and Confidentiality, 1(1):59-98, 2009.
    • (2009) J. Privacy and Confidentiality , vol.1 , Issue.1 , pp. 59-98
    • Lindell, Y.1    Pinkas, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.