메뉴 건너뛰기




Volumn 8319, Issue , 2014, Pages 41-54

Privacy-preserving computation

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84927664333     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-54069-1_3     Document Type: Conference Paper
Times cited : (24)

References (54)
  • 4
    • 78049411322 scopus 로고    scopus 로고
    • A certifying compiler for zero-knowledge proofs of knowledge based on σ-protocols
    • In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.), Springer, Heidelberg
    • Almeida, J.B., Bangerter, E., Barbosa, M., Krenn, S., Sadeghi, A.-R., Schneider, T.: A certifying compiler for zero-knowledge proofs of knowledge based on σ-protocols. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 151–167. Springer, Heidelberg (2010)
    • (2010) ESORICS 2010. LNCS , vol.6345 , pp. 151-167
    • Almeida, J.B.1    Bangerter, E.2    Barbosa, M.3    Krenn, S.4    Sadeghi, A.-R.5    Schneider, T.6
  • 7
    • 70350378277 scopus 로고    scopus 로고
    • Recognizing the use-mode of kitchen appliances from their current consumption
    • In: Barnaghi, P., Moessner, K., Presser, M., Meissner, S. (eds.), Springer, Heidelberg
    • Bauer, G., Stockinger, K., Lukowicz, P.: Recognizing the use-mode of kitchen appliances from their current consumption. In: Barnaghi, P., Moessner, K., Presser, M., Meissner, S. (eds.) EuroSSC 2009. LNCS, vol. 5741, pp. 163–176. Springer, Heidelberg (2009)
    • (2009) Eurossc 2009. LNCS , vol.5741 , pp. 163-176
    • Bauer, G.1    Stockinger, K.2    Lukowicz, P.3
  • 12
    • 57049188348 scopus 로고    scopus 로고
    • Sharemind: A framework for fast privacypreserving computations
    • In: Jajodia, S., Lopez, J. (eds.), Springer, Heidelberg
    • Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacypreserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192–206. Springer, Heidelberg (2008)
    • (2008) ESORICS 2008. LNCS , vol.5283 , pp. 192-206
    • Bogdanov, D.1    Laur, S.2    Willemson, J.3
  • 13
    • 67650690965 scopus 로고    scopus 로고
    • Order-preserving symmetric encryption
    • In: Joux, A. (ed.), Springer, Heidelberg
    • Boldyreva, A., Chenette, N., Lee, Y., O’Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224–241. Springer, Heidelberg (2009)
    • (2009) EUROCRYPT 2009. LNCS , vol.5479 , pp. 224-241
    • Boldyreva, A.1    Chenette, N.2    Lee, Y.3    O’neill, A.4
  • 14
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • In: Cachin, C., Camenisch, J.L. (eds.), Springer, Heidelberg
    • Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 506–522. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 506-522
    • Boneh, D.1    Di Crescenzo, G.2    Ostrovsky, R.3    Persiano, G.4
  • 16
    • 79954610963 scopus 로고    scopus 로고
    • Smart privacy for the smart grid: Embedding privacy into the design of electricity conservation
    • Cavoukian, A., Polonetskyand, J., Wolf, C.: Smart privacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society 3(2), 275–294 (2010)
    • (2010) Identity in the Information Society , vol.3 , Issue.2 , pp. 275-294
    • Cavoukian, A.1    Polonetskyand, J.2    Wolf, C.3
  • 17
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty computation from threshold homomorphic encryption
    • In: Pfitzmann, B. (ed.), Springer, Heidelberg
    • Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280–300. Springer, Heidelberg (2001)
    • (2001) EUROCRYPT 2001. LNCS , vol.2045 , pp. 280-300
    • Cramer, R.1    Damgård, I.B.2    Nielsen, J.B.3
  • 18
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • In: Jarecki, S., Tsudik, G. (eds.), Springer, Heidelberg
    • Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160–179. Springer, Heidelberg (2009)
    • (2009) PKC 2009. LNCS , vol.5443 , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 23
    • 79957974657 scopus 로고    scopus 로고
    • Implementing gentry’s fully-homomorphic encryption scheme
    • In: Paterson, K.G. (ed.), Springer, Heidelberg
    • Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)
    • (2011) EUROCRYPT 2011. LNCS , vol.6632 , pp. 129-148
    • Gentry, C.1    Halevi, S.2
  • 24
    • 0003691180 scopus 로고    scopus 로고
    • Basic Applications, vol. 2. Cambridge University Press
    • Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
    • (2004) The Foundations of Cryptography
    • Goldreich, O.1
  • 26
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM Journal of Computing 18(1), 186–208 (1989)
    • (1989) SIAM Journal of Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 27
    • 33750018128 scopus 로고    scopus 로고
    • Rational secret sharing, revisited
    • In: De Prisco, R., Yung, M. (eds.), Springer, Heidelberg
    • Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229–241. Springer, Heidelberg (2006)
    • (2006) SCN 2006. LNCS , vol.4116 , pp. 229-241
    • Gordon, S.D.1    Katz, J.2
  • 29
    • 0026970695 scopus 로고
    • Nonintrusive appliance load monitoring
    • Hart, G.W.: Nonintrusive appliance load monitoring. Proceedings of the IEEE 80(12), 1870–1891 (1992)
    • (1992) Proceedings of the IEEE , vol.80 , Issue.12 , pp. 1870-1891
    • Hart, G.W.1
  • 30
    • 79961197957 scopus 로고    scopus 로고
    • NRC HandelsbladApril
    • Heck, W.: Smart energy meter will not be compulsory. NRC Handelsblad (April 2009), http://www.nrc.nl/international/article2207260.ece/Smart.energy.meter.will.not.be.compulsory
    • (2009) Smart Energy Meter Will Not Be Compulsory
    • Heck, W.1
  • 32
    • 70349149683 scopus 로고    scopus 로고
    • Privacy for public transportation
    • In: Danezis, G., Golle, P. (eds.), Springer, Heidelberg
    • Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1–19. Springer, Heidelberg (2006)
    • (2006) PET 2006. LNCS , vol.4258 , pp. 1-19
    • Heydt-Benjamin, T.S.1    Chae, H.-J.2    Defend, B.3    Fu, K.4
  • 35
    • 77954928042 scopus 로고    scopus 로고
    • Telegraph (UK)October
    • Jamieson, A.: Smart meters could be ‘spy in the home’. Telegraph (UK) (October 2009), http://www.telegraph.co.uk/finance/newsbysector/energy/6292809/Smart-meters-could-be-spy-in-the-home.html
    • (2009) Smart Meters Could Be ‘spy in the home’
    • Jamieson, A.1
  • 36
    • 79961183580 scopus 로고    scopus 로고
    • Plug-in privacy for smart metering billing
    • Fischer-Hübner, S., Hopper, N. (eds.), Springer, Heidelberg
    • Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
    • (2011) PETS 2011. LNCS , vol.6794 , pp. 192-210
    • Jawurek, M.1    Johns, M.2    Kerschbaum, F.3
  • 40
    • 77249154055 scopus 로고    scopus 로고
    • Inferring personal information from demand-response systems
    • Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Security and Privacy 8(1), 11–20 (2010)
    • (2010) IEEE Security and Privacy , vol.8 , Issue.1 , pp. 11-20
    • Lisovich, M.A.1    Mulligan, D.K.2    Wicker, S.B.3
  • 41
    • 33749541500 scopus 로고    scopus 로고
    • Rationality and adversarial behavior in multi-party computation
    • In: Dwork, C. (ed.), Springer, Heidelberg
    • Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180–197. Springer, Heidelberg (2006)
    • (2006) CRYPTO 2006. LNCS , vol.4117 , pp. 180-197
    • Lysyanskaya, A.1    Triandopoulos, N.2
  • 44
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • In: Stern, J. (ed.), Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999. LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 50
    • 25444462746 scopus 로고    scopus 로고
    • Non-cooperative computation: Boolean functions with correctness and exclusivity
    • Shoham, Y., Tennenholtz, M.: Non-cooperative computation: boolean functions with correctness and exclusivity. Theoretical Computer Science 343(1-2), 97–113 (2005)
    • (2005) Theoretical Computer Science , vol.343 , Issue.1-2 , pp. 97-113
    • Shoham, Y.1    Tennenholtz, M.2
  • 51
    • 0026237284 scopus 로고
    • Using appliance signatures for monitoring residential loads at meter panel level
    • Sultanem, F.: Using appliance signatures for monitoring residential loads at meter panel level. IEEE Transactions on Power Delivery 6(4), 1380–1385 (1991)
    • (1991) IEEE Transactions on Power Delivery , vol.6 , Issue.4 , pp. 1380-1385
    • Sultanem, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.