1. Amirbekyan, A., Estivill-Castro, V.: A new efficient privacy-preserving scalar product protocol. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, 2007
2. Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. In: Proc. of PETS’08, 2008
3. Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Proceedings of the Seventh International Workshop on Algorithms and Data Structures (WADS 2001), 2001
4. Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Kupcu, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 2007
5. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Theory of Cryptography, 2008