1 |
A. C. Yao, 'Protocols for secure computations', At the 23rd Annual Symposium on the Foundations of Computer Science, IEEE, 1982
DOI
|
2 |
Y. Lindell, B. Pinkas, 'Privacy preserving data mining', Advances in Cryptology - Crypt02000, LNCS 1592, pp. 402-414,1999
|
3 |
O. Goldreich, 'Secure Multi-party Computation', Final Draft, Version 1.4, 2002
|
4 |
W. Du, M. J. Atallah, 'Secure multi-party computation problems and their applications: A review and open problems', In the Proceedings of the New Security Paradigms Workshop, pp. 11-20, 2001
DOI
|
5 |
M. J. Atallah, W. Du, 'Secure multi-party computational geometry', In WADS2001: 7th International Workshop on Algorithms and Data Structures, pp. 165-179,2001
DOI
ScienceOn
|
6 |
M. Atallah, M. Bykova, J. Li, K. Frikken, M. Topkara, 'Private collaborative forecasting and benchmarking', WEPS2004, 2004
DOI
|
7 |
O. Goldreich, S. Micali, A. Wigderson, 'How to play any mental game', In the Proceedings of the 19th Annual ACM Symposium on the Theory of Computing, pp. 218-229,1987
DOI
|
8 |
W. Du, M. J. Atallah, 'Privacy-preserving Cooperative Scientific Computations', In the 14th IEEE Computer Security Foundations Workshop, pp. 273-282,2001
|
9 |
W. Du, M. J. Atallah, 'Protocols for secure remote database access with approximate matching', In the 7th ACM Conference on Computer and Communications Security, 2000
|
10 |
W. Du, M. J. Atallah, 'Privacy-preserving statistical analysis', In the Proceedings of the 17th Annual Computer Security Applications Conference, pp. 102-110,2001
|
11 |
W. Du, Z. Zhan, 'A practical approach to solving secure multi-party computation problems', In New Security Paradigms Workshop 2002, pp. 127-135, 2002
DOI
|
12 |
M. Naor, B. Pinkas, 'Oblivious transfer and polynomial evaluation', In the Proceedings of the 31st ACM Symposium on the Theory of Computing, pp. 245-254, 1999
DOI
|