Secure Multi-party Computations and Privacy Preservation: Results and Open Problems
暂无分享,去创建一个
[1] Vladimir Zadorozhny,et al. A Framework for Efficient Security and Privacy Solutions in Data Intensive Wireless Sensor Networks , 2007 .
[2] Ole-Christoffer Granmo,et al. Privacy Preserving Data Mining in Telecommunication Services , 2007 .
[3] Mikhail J. Atallah,et al. Privacy-preserving credit checking , 2005, EC '05.
[4] Vladimir A. Oleshchuk,et al. Location Privacy for Cellular Systems; Analysis and Solution , 2005, Privacy Enhancing Technologies.
[5] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[6] Mikhail J. Atallah,et al. Privacy preserving electronic surveillance , 2003, WPES '03.
[7] Vladiinir A. Oleshchuk. Spatio-Temporal Exposure Control An investigation of spatial home control and location privacy preserving issues , 2003 .
[8] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[9] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[10] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[11] Wenliang Du,et al. Secure Multi-party Computational Geometry , 2001, WADS.
[12] Yuval Ishai,et al. Selective private function evaluation with applications to private statistics , 2001, PODC '01.
[13] Yuval Ishai,et al. Information-Theoretic Private Information Retrieval: A Unified Construction , 2001, ICALP.
[14] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[15] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[16] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[17] M. Atallah,et al. Secure Multi-Problem Computation Problems and Their Applications : A Review and Open Problems , 2001 .
[18] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[19] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[20] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[21] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[22] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[23] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[24] Joe Kilian,et al. Founding crytpography on oblivious transfer , 1988, STOC '88.
[25] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[26] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).