Secure Multi-Problem Computation Problems and Their Applications : A Review and Open Problems
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[3] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[4] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[5] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[6] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[7] Wojciech Rytter,et al. Text Algorithms , 1994 .
[8] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[9] Tal Malkin,et al. A Random Server Model for Private Information Retrieval (or Information Theoretic PIR Avoiding Database Replication , 1997 .
[10] Z. Galil,et al. Pattern matching algorithms , 1997 .
[11] Dan Gusfield. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[12] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[13] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[14] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[15] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[16] Rafail Ostrovsky,et al. Universal service-providers for database private information retrieval (extended abstract) , 1998, PODC '98.
[17] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[18] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[19] Christian Cachin,et al. Efficient private bidding and auctions with an oblivious third party , 1999, CCS '99.
[20] Yuval Ishai,et al. Improved upper bounds on information-theoretic private information retrieval (extended abstract) , 1999, STOC '99.
[21] Daryl E. Hershberger,et al. Collective Data Mining: a New Perspective toward Distributed Data Mining Advances in Distributed Data Mining Book , 1999 .
[22] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[23] Wenliang Du,et al. Protocols for Secure Remote Database Access with Approximate Matching , 2001, E-Commerce Security and Privacy.
[24] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[25] Anil K. Jain. Fundamentals of Digital Image Processing , 2018, Control of Color Imaging Systems.