SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Bo Yang, Yong Yu, Chung-Huang Yang. A Secure Scalar Product Protocol Against Malicious Adversaries[J]. Journal of Computer Science and Technology, 2013, 28(1): 152-158. DOI: 10.1007/s11390-013-1319-3 |
[1] |
Tran D H, Ng W K, Lim H W et al. An efficient cacheable securescalar product protocol for privacy-preserving data mining.In Proc. the 13th Int. Conf. Data Warehousing andKnowledge Discovery, Aug. 29-Sept. 2, 2011, pp.354-366.
|
[2] |
Goethals B, Laur S, Lipmaa H, Mielikainen T. On privatescalar product computation for privacy-preserving data mining.In Proc. the 7th Int. Conf. Information Security andCryptology, Dec. 2004, pp.104-120.
|
[3] |
Vaidya J, Clifton C. Privacy preserving association rule miningin vertically partitioned data. In Proc. the 8th SIGKDDInt. Conf. Knowledge Discovery and Data Mining, July2002, pp.639-644.
|
[4] |
Du W, Atallah M. Privacy-preserving cooperative statisticalanalysis. In Proc. the 17th Annual Computer Security ApplicationsConference, Dec. 2001, pp.102-110.
|
[5] |
Atallah M J, Du W. Secure multiparty computational geometry.In Proc. the 7th International Workshop on Algorithmsand Data Structures, Aug. 2011, pp.165-179.
|
[6] |
Thomas T. Secure Two-party protocols for point inclusionproblem. Int. J. Network Security, 2009, 9(1): 1-7.
|
[7] |
Yang B, Sun A D, Zhang W Z. Secure two-party protocolson planar circles. Journal of Information & ComputationalScience, 2011, 8(1): 29-40.
|
[8] |
Yang B, Shao Z Y, Zhang W Z. Secure two-party protocolson planar convex hulls. Journal of Information & ComputationalScience, 2012, 9(4): 915-929.
|
[9] |
Du W, Zhan Z. Building decision tree classifier on privatedata. In Proc. IEEE ICDM Workshop on Privacy, Security,and Data Mining, Dec. 2002, Vol.14, pp.1-8.
|
[10] |
Amirbekyan A, Estivill-Castro V E C. A new efficient privacypreservingscalar product protocol. In Proc. the 6th AustralasianData Mining Conference, Dec. 2007, pp.209-214.
|
[11] |
Hazay C. Efficient two-party computation with simulationbased security [Ph.D. Thesis]. Senate of Bar-Ilan University,Israel, 2009.
|
[12] |
Goldreich O. Foundations of Cryptography (Vol.2): Basic Applications.London, UK: Cambridge University Press, 2004.
|
[13] |
Schnorr C P. Efficient signature generation by smart cards.Journal of Cryptology, 1991, 4(3): 161-174.
|
[14] |
Camenisch J, Shoup V. Practical verifiable encryption anddecryption of discrete logarithms. In Proc. CRYPTO 2003,Aug. 2003, pp.126-144.
|
[15] |
Paillier P. Public-key cryptosystems based on composite degreeresidue classes. In Proc. the 17th Theory and Applicationof Cryptographic Techniques, May 1999, pp.223-238.
|
[16] |
Jarecki S, Liu X. Efficient oblivious pseudorandom functionwith applications to adaptive OT and secure computation ofset intersection. In Proc. the 6th Theory of CryptographyConference, March 2009, pp.577-594.
|
[1] | Ming Wan, Geng Wang, Shi-Feng Sun, Da-Wu Gu, Gong-Yu Shi. Efficient Function-Hiding Inner Product Functional Encryption and Its Application to Fine-Grained Data Sharing[J]. Journal of Computer Science and Technology, 2025, 40(3): 921-938. DOI: 10.1007/s11390-024-3670-y |
[2] | Zhao-Hui Li, Xin-Yu Feng. Verifying Contextual Refinement with Ownership Transfer[J]. Journal of Computer Science and Technology, 2021, 36(6): 1342-1366. DOI: 10.1007/s11390-021-1671-7 |
[3] | Yuan Li, Xing-Chen Wang, Lin Huang, Yun-Lei Zhao. Order-Revealing Encryption: File-Injection Attack and Forward Security[J]. Journal of Computer Science and Technology, 2021, 36(4): 877-895. DOI: 10.1007/s11390-020-0060-y |
[4] | Wan-Wei Liu, Fu Song, Tang-Hao-Ran Zhang, Ji Wang. Verifying ReLU Neural Networks from a Model Checking Perspective[J]. Journal of Computer Science and Technology, 2020, 35(6): 1365-1381. DOI: 10.1007/s11390-020-0546-7 |
[5] | Fateh Boucenna, Omar Nouali, Samir Kechid, M. Tahar Kechadi. Secure Inverted Index Based Search over Encrypted Cloud Data with User Access Rights Management[J]. Journal of Computer Science and Technology, 2019, 34(1): 133-154. DOI: 10.1007/s11390-019-1903-2 |
[6] | Xiao-Fen Wang, Yi Mu, Rongmao Chen, Xiao-Song Zhang. Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group[J]. Journal of Computer Science and Technology, 2016, 31(5): 1012-1027. DOI: 10.1007/s11390-016-1676-9 |
[7] | Zhen-Chuan Chai, Zhen-Fu Cao, Yuan Zhou. Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts[J]. Journal of Computer Science and Technology, 2007, 22(1): 103-108. |
[8] | Hai-Bo Tian, Xi Sun, Yu-Min Wang. A New Public-Key Encryption Scheme[J]. Journal of Computer Science and Technology, 2007, 22(1): 95-02. |
[9] | Yong-Long Luo, Liu-Sheng Huang, Hong Zhong. Secure Two-Party Point-Circle Inclusion Problem[J]. Journal of Computer Science and Technology, 2007, 22(1): 88-91. |
[10] | Shun-Dong Li, Yi-Qi Dai. Secure Two-Party Computational Geometry[J]. Journal of Computer Science and Technology, 2005, 20(2). |