Author:
Polat Huseyin,Du Wenliang,Renckes Sahin,Oysal Yusuf
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Linguistics and Language,Language and Linguistics
Reference45 articles.
1. Amirbekyan A, Estivill-Castro V (2007) A new efficient privacy-preserving scalar product protocol. In: Proceedings of the 6th Australasian conference on data mining and analytics, pp 209–214, Gold Coast, Queensland, Australia, December 3–4
2. Beaver D (1997) Commodity-based cryptography (extended abstract). In: Proceedings of the 29th annual ACM symposium on theory of computing, pp 446–455, El Paso, TX, USA, May 4–6
3. Beaver D (1998) Server-assisted cryptography. In: Proceedings of the 1998 workshop on new security paradigms, pp 92–106, Charlottesville, VA, USA, September 22–26
4. Beigel R, Fortnow L, Gasarch W (2006) A nearly tight lower bound for restricted private information retrieval protocols. Comput Complex 15(1): 82–91
5. Blier H, Tapp A (2008) A single initialization server for multi-party cryptography. Lect Notes Comput Sci 5155: 71–85
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献