New Attacks against Transformation-Based Privacy-Preserving Linear Programming
暂无分享,去创建一个
[1] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Jaideep Vaidya,et al. An inference–proof approach to privacy-preserving horizontally partitioned linear programs , 2014, Optim. Lett..
[3] Wenliang Du,et al. A study of several specific secure two-party computation problems , 2001 .
[4] Olvi L. Mangasarian. Privacy-preserving linear programming , 2011, Optim. Lett..
[5] Florian Kerschbaum,et al. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[6] Tomas Toft. Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.
[7] Matthew Roughan,et al. Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.
[8] Jaideep Vaidya,et al. Privacy-preserving linear programming , 2009, SAC '09.
[9] Wenliang Du,et al. A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.
[10] Alice Bednarz,et al. Methods for two-party privacy-preserving linear programming. , 2012 .
[11] Olvi L. Mangasarian. Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..
[12] Mikhail J. Atallah,et al. Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[13] Jaideep Vaidya,et al. Secure and efficient distributed linear programming , 2012, J. Comput. Secur..
[14] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[15] Wei Li,et al. Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..