Toward Empirical Aspects of Secure Scalar Product
暂无分享,去创建一个
Tsan-sheng Hsu | Da-Wei Wang | Justin Zhijun Zhan | Churn-Jung Liau | I-Cheng Wang | Chih-Hao Shen | J. Zhan | C. Liau | Da-Wei Wang | T. Hsu | I. Wang | Chih-Hao Shen
[1] L. Turner,et al. Inverse of the Vandermonde matrix with applications , 1966 .
[2] Yi-Ting Chiang,et al. Information Theoretical Analysis of Two-Party Secret Computation , 2006, DBSec.
[3] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[6] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[7] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[8] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[9] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[10] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[11] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[12] Yi-Ting Chiang,et al. Secrecy of Two-Party Secure Computation , 2005, DBSec.
[13] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[14] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[15] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[16] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[17] Joe Kilian,et al. A general completeness theorem for two party games , 1991, STOC '91.
[18] Da-Wei Wang,et al. Information-Theoretically Secure Number-Product Protocol , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[19] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[20] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[21] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[22] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.