Sciweavers

28 search results - page 6 / 6
» Efficient Receipt-Free Voting Based on Homomorphic Encryptio...
Sort
View
EUROCRYPT
2004
Springer
13 years 8 months ago
Efficient Private Matching and Set Intersection
We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain. This problem has m...
Michael J. Freedman, Kobbi Nissim, Benny Pinkas
ICISC
2004
173views Cryptology» more  ICISC 2004»
13 years 6 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 8 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls