Author:
Zhao Quanyu,Jiang Bingbing,Zhang Yuan,Wang Heng,Mao Yunlong,Zhong Sheng
Publisher
Springer Science and Business Media LLC
Reference50 articles.
1. Demmler D, Rindal P, Rosulek M, et al. PIR-PSI: scaling private contact discovery. Proc Privacy Enhancing Technol, 2018, 2018: 159–178
2. Troncoso-Pastoriza J R, Katzenbeisser S, Celik M. Privacy preserving error resilient DNA searching through oblivious automata. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007. 519–528
3. Kontaxis G, Athanasopoulos E, Portokalidis G, et al. Sauth: protecting user accounts from password database leaks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, 2013. 178–198
4. Narayanan A, Thiagarajan N, Lakhani M, et al. Location privacy via private proximity testing. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2011. 1–17
5. Meadows C. A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party. In: Proceedings of IEEE Symposium on Security and Privacy, 1986
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献