-
1
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
Dengguo Feng, David A. Basin, and Peng Liu, editors, ACM
-
Mikhail J. Atallah and Keith B. Frikken. Securely outsourcing linear algebra computations. In Dengguo Feng, David A. Basin, and Peng Liu, editors, ASIACCS, pages 48-59. ACM, 2010.
-
(2010)
ASIACCS
, pp. 48-59
-
-
Atallah, M.J.1
Frikken, K.B.2
-
2
-
-
27644520949
-
Secure outsourcing of sequence comparisons
-
Mikhail J. Atallah and Jiangtao Li. Secure outsourcing of sequence comparisons. Int. J. Inf. Sec., 4(4):277-287, 2005.
-
(2005)
Int. J. Inf. Sec.
, vol.4
, Issue.4
, pp. 277-287
-
-
Atallah, M.J.1
Li, J.2
-
4
-
-
74049112591
-
Hiccups on the road to privacy-preserving linear programming
-
New York, NY, USA, ACM
-
Alice Bednarz, Nigel Bean, and Matthew Roughan. Hiccups on the road to privacy-preserving linear programming. In Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, pages 117-120, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, WPES '09
, pp. 117-120
-
-
Bednarz, A.1
Bean, N.2
Roughan, M.3
-
5
-
-
84869382999
-
Foundations of garbled circuits
-
Ting Yu, George Danezis, and Virgil D. Gligor, ACM
-
Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits. In Ting Yu, George Danezis, and Virgil D. Gligor, editors, ACM Conference on Computer and Communications Security, pages 784-796. ACM, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 784-796
-
-
Bellare, M.1
Hoang, V.T.2
Rogaway, P.3
-
6
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS, Springer
-
Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, and Wenjing Lou. New algorithms for secure outsourcing of modular exponentiations. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS, volume 7459 of Lecture Notes in Computer Science, pages 541-556. Springer, 2012.
-
(2012)
Lecture Notes in Computer Science
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
7
-
-
84888986008
-
On securing untrusted clouds with cryptography
-
Yao Chen and Radu Sion. On securing untrusted clouds with cryptography. IEEE Data Eng. Bull., 35(4):9-20, 2012.
-
(2012)
IEEE Data Eng. Bull.
, vol.35
, Issue.4
, pp. 9-20
-
-
Chen, Y.1
Sion, R.2
-
8
-
-
84856170890
-
Practical privacy-preserving multiparty linear programming based on problem transformation
-
IEEE
-
Jannik Dreier and Florian Kerschbaum. Practical privacy-preserving multiparty linear programming based on problem transformation. In SocialCom/PASSAT, pages 916-924. IEEE, 2011.
-
(2011)
SocialCom/PASSAT
, pp. 916-924
-
-
Dreier, J.1
Kerschbaum, F.2
-
10
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
ACM Press
-
Wenliang Du and Zhijun Zhan. A practical approach to solve secure multi-party computation problems. In New Security Paradigms Workshop, pages 127-135. ACM Press, 2002.
-
(2002)
New Security Paradigms Workshop
, pp. 127-135
-
-
Du, W.1
Zhan, Z.2
-
11
-
-
38049029760
-
Encryption techniques for secure database outsourcing
-
Joachim Biskup and Javier Lopez, editors, ESORICS, Springer
-
Sergei Evdokimov and Oliver Günther. Encryption techniques for secure database outsourcing. In Joachim Biskup and Javier Lopez, editors, ESORICS, volume 4734 of Lecture Notes in Computer Science, pages 327-342. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4734
, pp. 327-342
-
-
Evdokimov, S.1
Günther, O.2
-
12
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Joe Kilian, editor, TCC, Springer
-
Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Joe Kilian, editor, TCC, volume 3378 of Lecture Notes in Computer Science, pages 264-282. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
13
-
-
84892885355
-
An inference-proof approach to privacy-preserving horizontally partitioned linear programs
-
To appear. Published online 05 October
-
Yuan Hong and Jaideep Vaidya. An inference-proof approach to privacy-preserving horizontally partitioned linear programs. Optimization Letters, 2013. To appear. Published online 05 October 2012.
-
(2012)
Optimization Letters
-
-
Hong, Y.1
Vaidya, J.2
-
14
-
-
84872255959
-
Secure and efficient distributed linear programming
-
Yuan Hong, Jaideep Vaidya, and Haibing Lu. Secure and efficient distributed linear programming. Journal of Computer Security, 20(5):583-634, 2012.
-
(2012)
Journal of Computer Security
, vol.20
, Issue.5
, pp. 583-634
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
-
15
-
-
84884724957
-
New Attacks against Transformation-Based Privacy-Preserving Linear Programming
-
Rafael Accorsi and Silvio Ranise, editors, Security and Trust Management (STM) 2013, 9th International Workshop, Springer
-
Peeter Laud and Alisa Pankova. New Attacks against Transformation-Based Privacy-Preserving Linear Programming. In Rafael Accorsi and Silvio Ranise, editors, Security and Trust Management (STM) 2013, 9th International Workshop, volume 8203 of Lecture Notes in Computer Science. Springer, 2013.
-
(2013)
Lecture Notes in Computer Science
, vol.8203
-
-
Laud, P.1
Pankova, A.2
-
17
-
-
84872266260
-
Privacy-preserving horizontally partitioned linear programs with inequality constraints
-
Wei Li, Haohao Li, and Chongyang Deng. Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optimization Letters, 7(1):137-144, 2013.
-
(2013)
Optimization Letters
, vol.7
, Issue.1
, pp. 137-144
-
-
Li, W.1
Li, H.2
Deng, C.3
-
18
-
-
78650750065
-
Privacy-preserving linear programming
-
Olvi L. Mangasarian. Privacy-preserving linear programming. Optimization Letters, 5(1):165-172, 2011.
-
(2011)
Optimization Letters
, vol.5
, Issue.1
, pp. 165-172
-
-
Mangasarian, O.L.1
-
19
-
-
84857650296
-
Privacy-preserving horizontally partitioned linear programs
-
Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs. Optimization Letters, 6(3):431-436, 2012.
-
(2012)
Optimization Letters
, vol.6
, Issue.3
, pp. 431-436
-
-
Mangasarian, O.L.1
-
20
-
-
70350349546
-
Solving linear programs using multiparty computation
-
Roger Dingledine and Philippe Golle, editors, Berlin, Heidelberg, Springer-Verlag
-
Tomas Toft. Solving linear programs using multiparty computation. In Roger Dingledine and Philippe Golle, editors, Financial Cryptography and Data Security, pages 90-107, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Financial Cryptography and Data Security
, pp. 90-107
-
-
Toft, T.1
-
21
-
-
69249243704
-
Privacy-preserving linear programming
-
Sung Y. Shin and Sascha Ossowski, editors, ACM
-
Jaideep Vaidya. Privacy-preserving linear programming. In Sung Y. Shin and Sascha Ossowski, editors, SAC, pages 2002-2007. ACM, 2009.
-
(2009)
SAC
, pp. 2002-2007
-
-
Vaidya, J.1
-
22
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
Cong Wang, Kui Ren, and Jia Wang. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM, 2011 Proceedings IEEE, pages 820-828, 2011.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
23
-
-
0020312165
-
Protocols for secure computations
-
(extended abstract) IEEE
-
Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In FOCS, pages 160-164. IEEE, 1982.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
|