Research on Secure Multi-party Computational Geometry
暂无分享,去创建一个
Yixian Yang | Xiaofeng Du | Yang Xin | Tao Geng | Shoushan Luo | Tao Geng | Shoushan Luo | Yang Xin | Xiaofeng Du | Yixian Yang
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[3] Niklaus Wirth,et al. Algorithms and Data Structures , 1989, Lecture Notes in Computer Science.
[4] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[5] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[6] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[7] Wenliang Du,et al. Secure multi-party computation problems and their applications: a review and open problems , 2001, NSPW '01.
[8] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[9] Shundong Li,et al. Secure Two-Party Computational Geometry , 2005, Journal of Computer Science and Technology.
[10] Dai Yiqi,et al. Secure Multi-Party Computation of Set-Inclusion and Graph-Inclusion , 2005 .
[11] Li Shundong,et al. A secure multi-party computation solution to intersection problems of sets and rectangles , 2006 .
[12] Huang Liusheng,et al. Privacy Protection in the Relative Position Determination for Two Spatial Geometric Objects , 2006 .
[13] Yonglong Luo,et al. Secure Two-Party Point-Circle Inclusion Problem , 2007, Journal of Computer Science and Technology.
[14] Chen Ping. Privacy-Preserving Point-Line Relation Determination Protocol and Its Applications , 2008 .
[15] Xiao Qian. A Study of Secure Two-Party Circle Computation Problem , 2009 .
[16] Liu Wen. A Privacy-Preserving Triangle Inequality Determination Protocol and Its Applications , 2009 .
[17] Ling Tong,et al. Privacy-Preserving Segment-Ellipse Intersect-Determination Protocol , 2010, 2010 2nd International Conference on E-business and Information System Security.
[18] Shoushan Luo,et al. Secure Multi-Party Comparing Protocol Based on Multi-Threshold Secret Sharing Scheme , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[19] Ji Zhang,et al. Privacy-Preserving Protocols for String Matching , 2010, 2010 Fourth International Conference on Network and System Security.