Author:
Shi Run-hua,Mu Yi,Zhong Hong,Cui Jie,Zhang Shun
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Yao, A. C. Protocols for secure computations. In Proc. 23rd IEEE Symposium on Foundations of Computer Science (FOCS’ 82), 160 (1982).
2. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X. & Zhu, M. Y. Tools for Privacy-Preserving Distributed Data Mining. ACM SIGKDD Explorations Newsletter 4, 28–34 (2002).
3. Sanil, A. P., Karr, A. F., Lin, X. & Reiter, J. P. Privacy preserving regression modeling via distributed computation. In Proc. the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 677-682 (2004).
4. Atallah, M., Bykova, M., Li, J., Frikken, K. & Tophara, M. Private collaborative forecasting and benchmarking. In Proc. the 2004 ACM Workshop on Privacy in the Electronic Society, 103-114 (2004).
5. Masayuki, A. Non-interactive and optimally resilient distributed multiplication (Special Section on Discrete Mathematics and Its Applications). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E83A, 598–605 (2000).
Cited by
93 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献