|
[1] B. Barak, R. Canetti, Y. Lindell, R. Pass and T. Rabin. Secure Computation Without Authentication. In CRYPTO 2005, Springer-Verlag (LNCS 3621), pages 361-377, 2005. [2] C.Cachin. Efficient private bidding and auction with an oblivious third party. In Proceedings of the 6th ACM conference on Computer and communications security, November 1999 [3] C. L. Lawson, R. J. Hanson. Solving Least Squares Problems. Englewood Cliffs, N.J.: PrenticeHall, pp. 180-198, 1974. [4] D.Chaum, C.Crepeau, and I.Damgard. Multiparty unconditionally secure protocols. In Proceedings of the 20th Annual ACM Symposium on Theory of Computing, STOC’88, 1988. [5] Goldreich, O. Foundations of Cryptography, Volume II: Basic Applications. Cambridge University Press, 2004. [6] M. Atallah, J. Rice. Secure Outsourcing of Scientific Computations. In Privacy Enhancing Technologies : 63-78, 2004. [7] Martin T.Hagan, Howard B. Demuth, and Mark Beale. [Book] Neural Network Desing. [8] Mikhail J. Atallah, Florian Kerschbaum, Wenliang Du. Secure and Private Sequence Comparisons. In Proceedings of the ACM workshop on Privacy in the electronic society, Pages: 39 - 44, 2003 [9] Mikhail J. Atallah, Wenliang Du. Secure Multi-party Computational Geometry. In roceedings of the 7th International Workshop on Algorithms and Data Structures, Pages: 165 - 179. [10] M.Hernandez and S.Stolfo. The merge/purge problem for large databases. n Proceedings of the 1995 ACM SIGMOD, May 1995. [11] Pradeep Ravikumar, William W. Cohen. A Secure Protocol for Computing String Distance Metrics. n Proceedings of ICDM Workshop on Privacy and Security Aspects of Data Mining, 2004. [12] Ronald Cramer, and Ivan Damgard. Multiparty Computation, an Introduction. [13] S. Goldwasser and Y. Lindell. Secure Computation Without Agreement. In the Journal of Cryptology, 18(3):247-287, 2005. [14] Wenliang Du .A Study of Several Specific Secure Two-Party Computation Problems. PhD thesis, Purdue University, West Lafayette, Indiana, 2001. [15] Yao, A. C. Protocols for Secure Computation. In 23rd IEEE Symposium on Foundations of Computer Science, pages 160–164, 1982. [16] Yingpeng Sang. Hong Shen. Zonghua Zhang. An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. Sixth Int’l Conf. on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 488-492, 2005 [17] Y. Ishai, E. Kushilevitz, Y. Lindell and E. Petrank. Black-Box Constructions for Secure Computation. In the 38th STOC, pages 99-108, 2006. [18] Y. Lindell. Parallel Coin-Tossing and Constant-Round Secure Two- Party Computation. In the Journal of Cryptology, 16(3):143-184, 2003. [19] http://www.pinkas.net/ot.html
|