A Secure Scalar Product Protocol Against Malicious Adversaries
暂无分享,去创建一个
[1] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[2] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Wee Keong Ng,et al. An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining , 2011, DaWaK.
[5] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[6] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[7] Tony Thomas,et al. Secure Two-party Protocols for Point Inclusion Problem , 2007, Int. J. Netw. Secur..
[8] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[9] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[10] Christoph Böhm,et al. The Basic Applications , 2013 .
[11] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[12] Artak Amirbekyan,et al. A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.
[13] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[14] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[15] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.