Secure Multi-party Computations and Privacy Preservation: Results and Open Problems

[1]  Vladimir Zadorozhny,et al.  A Framework for Efficient Security and Privacy Solutions in Data Intensive Wireless Sensor Networks , 2007 .

[2]  Ole-Christoffer Granmo,et al.  Privacy Preserving Data Mining in Telecommunication Services , 2007 .

[3]  Mikhail J. Atallah,et al.  Privacy-preserving credit checking , 2005, EC '05.

[4]  Vladimir A. Oleshchuk,et al.  Location Privacy for Cellular Systems; Analysis and Solution , 2005, Privacy Enhancing Technologies.

[5]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[6]  Mikhail J. Atallah,et al.  Privacy preserving electronic surveillance , 2003, WPES '03.

[7]  Vladiinir A. Oleshchuk Spatio-Temporal Exposure Control An investigation of spatial home control and location privacy preserving issues , 2003 .

[8]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[9]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[10]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[11]  Wenliang Du,et al.  Secure Multi-party Computational Geometry , 2001, WADS.

[12]  Yuval Ishai,et al.  Selective private function evaluation with applications to private statistics , 2001, PODC '01.

[13]  Yuval Ishai,et al.  Information-Theoretic Private Information Retrieval: A Unified Construction , 2001, ICALP.

[14]  Wenliang Du,et al.  Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..

[15]  Moni Naor,et al.  Efficient oblivious transfer protocols , 2001, SODA '01.

[16]  Oded Goldreich,et al.  The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .

[17]  M. Atallah,et al.  Secure Multi-Problem Computation Problems and Their Applications : A Review and Open Problems , 2001 .

[18]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[19]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[20]  Shafi Goldwasser,et al.  Multi party computations: past and present , 1997, PODC '97.

[21]  Niv Gilboa,et al.  Computationally private information retrieval (extended abstract) , 1997, STOC '97.

[22]  Peter Winkler,et al.  Comparing information without leaking it , 1996, CACM.

[23]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[24]  Joe Kilian,et al.  Founding crytpography on oblivious transfer , 1988, STOC '88.

[25]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[26]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).