共 23 条
[1]
Bogdanov D., Sharemind: Programmable Secure Computations with Practical Applications, (2013)
[2]
Latanya S., K-anonymity: A model for protecting privacy, International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, 10, 5, pp. 557-570, (2002)
[3]
MacHanavajjhala A., Kifer D., Gehrke J., Venkitasubramaniam M., L-diversity: Privacy beyond k-anonymity, IEEE Transactions on Knowledge Discovery from Data, 1, (2007)
[4]
Li N., Li T., Venkatasubramanian S., Closeness: A new privacy measure for data publishing, IEEE Transactions on Knowledge, and Data Engineering, 22, 7, pp. 943-956, (2010)
[5]
Dwork C., Differential privacy, Proceedings of the 33rd International Colloquium on Automata, Languages, and Programming, ICALP'06, 4052, pp. 1-12, (2006)
[6]
Laur S., Willemson J., Zhang B., Round-efficient oblivious database manipulation, Proceedings of ISC, 2011, pp. 262-277, (2011)
[7]
Laur S., Talviste R., Willemson J., From oblivious aes to efficient, and secure database join in the multiparty setting, Proceedings of the 11th International Conference on Applied Cryptography, and Network Security, ACNS'13, 7954, pp. 84-101, (2013)
[8]
Knuth D.E., The Art of Computer Programming, 3, (1998)
[9]
Bogdanov D., Laur S., Talviste R., A practical analysis of oblivious sorting algorithms for secure multi-party computation, Proceedings of the 19th Nordic Conference on Secure IT Systems, NordSec 2014, 8788, pp. 59-74, (2014)
[10]
Hoare C.A.R., Algorithm 65: Find, Commun. ACM, 4, 7, pp. 321-322, (1961)