Per-se Privacy Preserving Solution Methods Based on Optimization
暂无分享,去创建一个
[1] Joachim Biskup,et al. On Pseudonymization of Audit Data for Intrusion Detection , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[2] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[3] Octavian Catrina,et al. Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.
[4] George J. Pappas,et al. Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.
[5] Silvio Micali,et al. Secure Computation (Abstract) , 1991, CRYPTO.
[6] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[7] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[8] Sandip Roy,et al. Characterization of security levels for the dynamics of autonomous vehicle networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[9] Paul Feldman,et al. A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).
[10] Glenn Fung,et al. Privacy-preserving classification of vertically partitioned data via random kernels , 2008, TKDD.
[11] Glenn Fung,et al. Privacy-preserving linear and nonlinear approximation via linear programming , 2013, Optim. Methods Softw..
[12] F. Schneider. Blueprint for a Science of Cybersecurity , 2011 .
[13] Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..
[14] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[15] Ran Canetti,et al. Studies in secure multiparty computation and applications , 1995 .
[16] Paulo Tabuada,et al. Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[17] Olvi L. Mangasarian,et al. Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels , 2008, DMIN.
[18] Matthew Roughan,et al. Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.
[19] Michael O. Rabin,et al. How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..
[20] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[21] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[22] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[23] Alice Bednarz,et al. Methods for two-party privacy-preserving linear programming. , 2012 .
[24] Florian Dörfler,et al. Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[25] Carlo Fischione,et al. Per-se Privacy Preserving Distributed Optimization , 2012, ArXiv.
[26] John S. Baras,et al. Social networks over wireless networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[27] Florian Kerschbaum,et al. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[28] Tomas Toft. Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.
[29] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[30] W. Rudin. Principles of mathematical analysis , 1964 .
[31] Anna Scaglione,et al. Grid integration of distributed renewables through coordinated demand response , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).
[32] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[33] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[34] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[35] Olvi L. Mangasarian. Privacy-preserving linear programming , 2011, Optim. Lett..
[36] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[37] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[38] Adi Shamir,et al. How to share a secret , 1979, CACM.
[39] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[40] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.