Secure multi-party computation problems and their applications: a review and open problems
暂无分享,去创建一个
[1] Joachim Biskup,et al. Recent Advances in Intrusion Detection , 2000, Lecture Notes in Computer Science.
[2] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[3] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[4] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[7] Daryl E. Hershberger,et al. Collective Data Mining: a New Perspective toward Distributed Data Mining Advances in Distributed Data Mining Book , 1999 .
[8] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[9] Alfred Burton Marsh. Matching algorithms. , 1979 .
[10] Joachim Biskup,et al. On Pseudonymization of Audit Data for Intrusion Detection , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Z. Galil,et al. Pattern matching algorithms , 1997 .
[12] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[13] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[14] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[15] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[16] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[17] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[18] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[19] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[20] S L Warner,et al. Randomized response: a survey technique for eliminating evasive answer bias. , 1965, Journal of the American Statistical Association.
[21] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[22] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[23] Tal Malkin,et al. A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication , 1998, RANDOM.
[24] Vineet Bafna,et al. Pattern Matching Algorithms , 1997 .
[25] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[26] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[27] Michael S. Goodstadt,et al. The Randomized Response Technique: A Test on Drug Use , 1975 .
[28] Rafail Ostrovsky,et al. Universal service-providers for database private information retrieval (extended abstract) , 1998, PODC '98.
[29] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[30] Kenneth H. Pollock,et al. A Comparison of Three Randomized Response Models for Quantitative Data , 1976 .
[31] Wojciech Rytter,et al. Text Algorithms , 1994 .
[32] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.
[33] Yuval Ishai,et al. Improved upper bounds on information-theoretic private information retrieval (extended abstract) , 1999, STOC '99.
[34] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[35] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[36] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[37] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[38] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.