Knowledge-oriented secure multiparty computation
暂无分享,去创建一个
[1] Michael Hicks,et al. Dynamic Enforcement of Knowledge-Based Security Policies , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[2] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[3] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[4] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[5] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[6] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[7] Moni Naor,et al. Our Data, Ourselves: Privacy Via Distributed Noise Generation , 2006, EUROCRYPT.
[8] Eran Omri,et al. Distributed Private Data Analysis: On Simultaneously Solving How and What , 2008, CRYPTO.
[9] E. Kushilevitz. Foundations of Cryptography Foundations of Cryptography , 2014 .
[10] Michael R. Clarkson,et al. Quantifying information flow with beliefs , 2009, J. Comput. Secur..
[11] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[12] Nina Mishra,et al. Simulatable auditing , 2005, PODS.
[13] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[14] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).