1. Narayanan Arvind , Thiagarajan Narendran , Lakhani Mugdha , 2011 . Location privacy via private proximity testing . In Proceedings of the Network and Distributed System Security Symposium, NDSS. Narayanan Arvind, Thiagarajan Narendran, Lakhani Mugdha, 2011. Location privacy via private proximity testing. In Proceedings of the Network and Distributed System Security Symposium, NDSS.
2. Digital RMB Anti-Money Laundering Joint Risk Control: Application Scenario Analysis of Privacy-Preserving Computing;Wei Zhu;Credit Reference,2022
3. Baldi Pierre , Baronio Roberta , Cristofaro Emiliano De , 2011 . Countering gattaca: efficient and secure testing of fully-sequenced human genomes . In ACM Conference on Computer and Communications Security, 691 -702 . Baldi Pierre, Baronio Roberta, Cristofaro Emiliano De, 2011. Countering gattaca: efficient and secure testing of fully-sequenced human genomes. In ACM Conference on Computer and Communications Security, 691 -702.
4. Ghita Mezzour Adrian Perrig Virgil Gligor 2009. Privacy-preserving relationship path discovery in social networks. In CANS 189 – 208. Ghita Mezzour Adrian Perrig Virgil Gligor 2009. Privacy-preserving relationship path discovery in social networks. In CANS 189 – 208.
5. A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party