-
2
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas, "A proof of security of yao's protocol for two-party computation, " J. Cryptol., vol. 22, no. 2, pp. 161-188, 2009.
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
3
-
-
77955211574
-
-
arXiv Prepr. arXiv1003.4071
-
R. Sheikh, B. Kumar, and D. Mishra, "A distributed k-secure sum protocol for secure multi-party computations, " arXiv Prepr. arXiv1003.4071, vol. 2, no. 3, pp. 68-72, 2010.
-
(2010)
A Distributed K-secure Sum Protocol for Secure Multi-party Computations
, vol.2
, Issue.3
, pp. 68-72
-
-
Sheikh, R.1
Kumar, B.2
Mishra, D.3
-
4
-
-
33746335051
-
Differential privacy
-
C. Dwork, "Differential privacy, " Int. Colloq. Autom. Lang. Program., vol. 4052, no. d, pp. 1-12, 2006.
-
(2006)
Int. Colloq. Autom. Lang. Program.
, vol.4052
, Issue.D
, pp. 1-12
-
-
Dwork, C.1
-
5
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy, " Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 10, no. 05, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertainty, Fuzziness Knowledge-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
6
-
-
84871902175
-
SHARE: System design and case studies for statistical health information release
-
Jan
-
J. Gardner, L. Xiong, Y. Xiao, J. Gao, A. R. Post, X. Jiang, and L. Ohno-Machado, "SHARE: system design and case studies for statistical health information release., " J. Am. Med. Inform. Assoc., vol. 20, no. 1, pp. 109-16, Jan. 2013.
-
(2013)
J. Am. Med. Inform. Assoc.
, vol.20
, Issue.1
, pp. 109-116
-
-
Gardner, J.1
Xiong, L.2
Xiao, Y.3
Gao, J.4
Post, A.R.5
Jiang, X.6
Ohno-Machado, L.7
-
7
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-diversity: privacy beyond k-anonymity, " in Proceedings of the 22nd International Conference on Data Engineering, 2006, pp. 1-12.
-
(2006)
Proceedings of the 22nd International Conference on Data Engineering
, pp. 1-12
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
8
-
-
34548805858
-
T closeness: Privacy beyond k-anonymity and -diversity
-
N. Li, T. Li, and S. Venkatasubramanian, "t Closeness : Privacy Beyond k-Anonymity and -Diversity, " in Data Engineering, IEEE 23rd International Conference on, 2007, no. 2, pp. 106-115.
-
(2007)
Data Engineering, IEEE 23rd International Conference on
, Issue.2
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith, "Calibrating noise to sensitivity in private data analysis, " Theory Cryptogr., vol. 3876, no. 1, pp. 265-284, 2006.
-
(2006)
Theory Cryptogr.
, vol.3876
, Issue.1
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
10
-
-
3142716056
-
Order preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data, " in Proceedings of the 2004 ACM SIGMOD international conference on Management of data - SIGMOD '04, 2004, p. 563.
-
(2004)
Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data - SIGMOD '04
, pp. 563
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
11
-
-
80955157888
-
Can homomorphic encryption be practical?
-
M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?, " in Proceedings of the 3rd ACM workshop on Cloud computing security workshop - CCSW '11, 2011, p. 113.
-
(2011)
Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW '11
, pp. 113
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
12
-
-
84896995214
-
Homomorphic encryption
-
M. Ogburn, C. Turner, and P. Dahal, "Homomorphic encryption, " in Procedia Computer Science, 2013, vol. 20, pp. 502-509.
-
(2013)
Procedia Computer Science
, vol.20
, pp. 502-509
-
-
Ogburn, M.1
Turner, C.2
Dahal, P.3
-
13
-
-
43949118608
-
A survey of homomorphic encryption for nonspecialists
-
C. Fontaine and F. Galand, "A survey of homomorphic encryption for nonspecialists, " EURASIP J. Inf. ..., 2007.
-
(2007)
EURASIP J. Inf.
-
-
Fontaine, C.1
Galand, F.2
-
14
-
-
33745655621
-
A new security proof for damgard's Elgamal
-
K. Gjøsteen, "A New Security Proof for Damgard's ElGamal, " in Topics in Cryptology - CT-RSA, 2006, pp. 150-158.
-
(2006)
Topics in Cryptology - CT-RSA
, pp. 150-158
-
-
Gjøsteen, K.1
-
16
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes, " in Advances in cryptology-EUROCRYPT'99, 1999, pp. 223-238.
-
(1999)
Advances in Cryptology-EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
17
-
-
84856466374
-
(Leveled) fully homomorphic encryption without bootstrapping
-
Z. Brakerski, C. Gentry, and V. Vaikuntanathan, "(Leveled) fully homomorphic encryption without bootstrapping, " in Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12, 2012, vol. 111, no. 111, pp. 309-325.
-
(2012)
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference on - ITCS '12
, vol.111
, Issue.111
, pp. 309-325
-
-
Brakerski, Z.1
Gentry, C.2
Vaikuntanathan, V.3
-
20
-
-
77956993098
-
Fully homomorphic encryption over the integers
-
M. Van Dijk and C. Gentry, "Fully homomorphic encryption over the integers, " Adv. Cryptology- ..., 2010.
-
(2010)
Adv. Cryptology
-
-
Van Dijk, M.1
Gentry, C.2
-
21
-
-
80955132201
-
Efficient fully homomorphic encryption from (standard) LWE
-
Z. Brakerski and V. Vaikuntanathan, "Efficient fully homomorphic encryption from (standard) LWE, " Found. Comput., 2011.
-
(2011)
Found. Comput.
-
-
Brakerski, Z.1
Vaikuntanathan, V.2
-
22
-
-
0022080529
-
A randomized protocol for signing contracts
-
Jun
-
S. Even, O. Goldreich, and A. Lempel, "A randomized protocol for signing contracts, " Commun. ACM, vol. 28, no. 6, pp. 637-647, Jun. 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
23
-
-
84957381006
-
Cryptanalysis of alleged A5 stream cipher
-
J. D. Golić., "Cryptanalysis of alleged A5 stream cipher, " in Advances in Cryptology-EUROCRYPT'97, 1997, pp. 239-255.
-
(1997)
Advances in Cryptology-EUROCRYPT'97
, pp. 239-255
-
-
Golić, J.D.1
-
24
-
-
84965066515
-
Announcing the advanced encryption standard (AES)
-
"Announcing the Advanced Encryption Standard (AES), " Fed. Inf. Process. Stand. Publ., 2001.
-
(2001)
Fed. Inf. Process. Stand. Publ.
-
-
-
25
-
-
84920134094
-
-
"MIMIC II Clinical Database." [Online]. Available: https://mimic.physionet.org/database.html.
-
MIMIC II Clinical Database
-
-
|