暂无分享,去创建一个
Durgesh Kumar Mishra | Neha Koria | Nikhil Kapoor | Ravish Bahety | D. Mishra | Neha Koria | Nikhil Kapoor | Ravish Bahety
[1] Yücel Saygin,et al. Privacy preserving association rule mining , 2002, Proceedings Twelfth International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems RIDE-2EC 2002.
[2] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[3] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[4] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[5] Chris Clifton,et al. Leveraging the "Multi" in secure multi-party computation , 2003, WPES '03.
[6] Ueli Maurer,et al. Secure multi-party computation made simple , 2002, Discret. Appl. Math..
[7] Birgit Pfitzmann,et al. Secure Reactive Systems , 2000 .
[8] Yehuda Lindell,et al. Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation , 2001, Journal of Cryptology.
[9] Ueli Maurer. The role of cryptography in database security , 2004, SIGMOD '04.
[10] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[11] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[12] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[13] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.