High-performance secure multi-party computation for data mining applications
暂无分享,去创建一个
Dan Bogdanov | Jan Willemson | Tomas Toft | Margus Niitsoo | J. Willemson | D. Bogdanov | Margus Niitsoo | Tomas Toft
[1] Yücel Saygin,et al. Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.
[2] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[3] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[4] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[5] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[6] Peter L. Montgomery,et al. Division by invariant integers using multiplication , 1994, PLDI '94.
[7] Dan Bogdanov,et al. Deploying Secure Multi-Party Computation for Financial Data Analysis - (Short Paper) , 2012, Financial Cryptography.
[8] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[9] Peter-Michael Seidel,et al. A parametric error analysis of Goldschmidt's division algorithm , 2003, Proceedings 2003 16th IEEE Symposium on Computer Arithmetic.
[10] Vitaly Shmatikov,et al. Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 , 2011, CCS.
[11] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[12] Behrooz Parhami,et al. Computer arithmetic - algorithms and hardware designs , 1999 .
[13] Thomas L. Rodeheffer. Software Integer Division , 2008 .
[14] I. Damglurd. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation , 2006 .
[15] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[16] Lior Malka,et al. VMCrypt: modular software architecture for scalable secure computation , 2011, CCS '11.