Leveraging the "Multi" in secure multi-party computation
暂无分享,去创建一个
[1] Moni Naor,et al. Communication preserving protocols for secure function evaluation , 2001, STOC '01.
[2] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[3] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[4] Donald Beaver,et al. Commodity-based cryptography (extended abstract) , 1997, STOC '97.
[5] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[6] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..
[9] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[10] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[11] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[12] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[13] Murat Kantarcioglu,et al. An architecture for privacy-preserving mining of client information , 2002 .
[14] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[15] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[16] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[17] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[18] Mikhail J. Atallah,et al. A secure protocol for computing dot-products in clustered and distributed environments , 2002, Proceedings International Conference on Parallel Processing.
[19] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[20] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.