Author:
Pedersen Thomas B.,Savaş Erkay
Subject
Information Systems and Management
Reference33 articles.
1. Rakesh Agrawal, Ramakrishnan Srikant, Privacy-preserving data mining, in: SIGMOD’00: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, ACM Press, 2000, pp. 439–450.
2. Mikhail J. Atallah, Wenliang Du, Privacy-preserving cooperative statistical analysis, in: Proceedings of the 17th Annual Computer Security Applications Conference, 2001, ACSAC 2001, 2001, pp. 102–110.
3. Mihir Bellare, Silvio Micali, Non-interactive oblivious transfer and applications, in: Advances in Cryptology – CRYPTO’89, A Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol. 435, Springer-Verlag, 1990, pp. 547–557.
4. Michael Ben-Or, Shafi Goldwasser, Avi Wigderson, Completeness theorems for non-cryptographic fault-tolerant distributed computation, in: Proceedings of the 19th Annual ACM Conference on Theory of Computing (STOC), ACM Press, 1988, pp. 1–10.
5. Benny Chor, Eyal Kushilevitz, A zero-one law for boolean privacy, in: STOC’89: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, Lecture Notes in Computer Science, ACM, 1989, pp. 62–72.