共 13 条
[1]
Yao A.C., Protocols for secure computations, Proceedings of 23rd Annual IEEE Symposium of Foundations of Computer Science, pp. 160-164, (1982)
[2]
Goldreich O., Micali S., Wigderson A., How to play any mental game, Proceedings of The 19th Symposium On Theory of Computing (STOC), pp. 218-229, (1987)
[3]
Freedman M., Nissim K., Pinkas B., Efficient private matching and set intersection, Proceedings of Eurocrypt 2004, pp. 1-19, (2004)
[4]
Lindell Y., Pinkas B., Privacy preserving data mining, Journal of Cryptology, 15, pp. 177-206, (2002)
[5]
Cachin C., Efficient private bidding and auction with an obvious third party, Proceeding of The 6th ACM Conference On Computer and Communication Security, pp. 120-127, (1999)
[6]
Atallah J., Du W.L., Secure multi-party computational geometry, 7th International Workshop On Algorithms and Data Structures, pp. 165-179, (2001)
[7]
Wang Q., Luo Y., Huang L., Privacy preserving protocols for finding the convex hulls, ARES'08, Washington IEEE Computer Society, pp. 727-732, (2008)
[8]
Goldreich O., Foundations of Cryptography: Basic Applications, (2004)
[9]
Du W., Atalla M.J., Secure multi-party computation problems and their applications: A review and open problems, New Security Paradigms Workshop, pp. 11-20, (2001)
[10]
Chen T.M., Optimal output-sensitive convex hull algorithms in two and three dimensions, Discrete Computational Geometry, 16, pp. 361-368, (1996)