Research on Secure Scalar Product Protocol and Its' Application
暂无分享,去创建一个
Yucui Guo | Yang Xin | Shoushan Luo | Cong Wang | Shuai Zeng | Fen Xu | Shoushan Luo | Yang Xin | Yucui Guo | Cong Wang | Fen Xu | Shuai Zeng
[1] Vladimir Estivill-Castro,et al. Private representative-based clustering for vertically partitioned data , 2004, Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004..
[2] Artak Amirbekyan,et al. The Privacy of k-NN Retrieval for Horizontal Partitioned Data -- New Methods and Applications , 2007, ADC.
[3] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[4] Vipin Kumar,et al. Privacy Preserving Nearest Neighbor Search , 2006, Sixth IEEE International Conference on Data Mining - Workshops (ICDMW'06).
[5] Artak Amirbekyan,et al. Privacy Preserving DBSCAN for Vertically Partitioned Data , 2006, ISI.
[6] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[7] Artak Amirbekyan,et al. A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.
[8] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[9] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[10] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[11] Yi-Ting Chiang,et al. Secrecy of Two-Party Secure Computation , 2005, DBSec.
[12] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[13] Yunghsiang Sam Han,et al. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.
[14] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[15] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[16] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[17] Chris Clifton,et al. Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.