Author:
Wu Mu-En,Chang Shih-Ying,Lu Chi-Jen,Sun Hung-Min
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference62 articles.
1. R. Agrawal, A. Evfimievski, R. Srikant, Information sharing across private databases, in: Proc. the ACM SIGMOD International Conference on Management of Data, ACM, 2003, pp. 86–97.
2. G. Ateniese, M. Blanton, J. Kirsch, Secret handshakes with dynamic and fuzzy matching, in: Proc. of Network and Distributed System Security Symposium, 2007, pp. 159–177.
3. D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, H. Wong, Secret handshakes from pairing-based key agreements, in: Proc. Security and Privacy, IEEE, 2003, pp. 180–196.
4. Meetings through the cloud: privacy-preserving scheduling on mobile devices;Bilogrevic;J. Syst. Softw.,2011
5. R. Bradshaw, J. Holt, K. Seamons, Concealing complex policies with hidden credentials, in: Proc. of the 11th ACM Conference on Computer and Communications Security, ACM, 2004, pp. 146–157.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献