[PDF][PDF] ABY-A framework for efficient mixed-protocol secure two-party computation.

D Demmler, T Schneider, M Zohner - NDSS, 2015 - encrypto.de
Secure computation enables mutually distrusting parties to jointly evaluate a function on
their private inputs without revealing anything but the function's output. Generic secure …

A survey on trust management for Internet of Things

Z Yan, P Zhang, AV Vasilakos - Journal of network and computer …, 2014 - Elsevier
Abstract Internet of Things (IoT) is going to create a world where physical objects are
seamlessly integrated into information networks in order to provide advanced and intelligent …

Sok: General purpose compilers for secure multi-party computation

M Hastings, B Hemenway, D Noble… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Secure multi-party computation (MPC) allows a group of mutually distrustful parties to
compute a joint function on their inputs without revealing any information beyond the result …

FalconDB: Blockchain-based collaborative database

Y Peng, M Du, F Li, R Cheng, D Song - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
Nowadays an emerging class of applications are based oncollaboration over a shared
database among different entities. However, the existing solutions on shared database may …

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

RL Lagendijk, Z Erkin, M Barni - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …

Generating private recommendations efficiently using homomorphic encryption and data packing

Z Erkin, T Veugen, T Toft… - IEEE transactions on …, 2012 - ieeexplore.ieee.org
Recommender systems have become an important tool for personalization of online
services. Generating recommendations in online services depends on privacy-sensitive data …

Secure computation with fixed-point numbers

O Catrina, A Saxena - Financial Cryptography and Data Security: 14th …, 2010 - Springer
Secure computation is a promising approach to business problems in which several parties
want to run a joint application and cannot reveal their inputs. Secure computation preserves …

Secure and efficient protocols for iris and fingerprint identification

M Blanton, P Gasti - Computer Security–ESORICS 2011: 16th European …, 2011 - Springer
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …

[图书][B] Privacy and data mining

J Vaidya, YM Zhu, CW Clifton - 2006 - Springer
Data mining has emerged as a significant technology for gaining knowledge from vast
quantities of data. However, there has been growing concern that use of this technology is …

Privacy-preserving tensor decomposition over encrypted data in a federated cloud environment

J Feng, LT Yang, Q Zhu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Tensors are popular and versatile tools which model multidimensional data. Tensor
decomposition has emerged as a powerful technique dealing with multidimensional data …