Bibliography to Secure Multi-party computations

From CryptoWiki
Jump to: navigation, search

1. YA82
Yao A. C. Protocols for Secure Computations (Extended Abstract). — 1982. — С. 160—164.

Back

2. LP09
Lindell Y., Pinkas B. Secure Multiparty Computation for Privacy-Preserving Data Mining // The Journal of Privacy and Confidentiality. — 2009. — С. 59—98.

Back

3. DA01
Du W., Atallah M.J. Secure Multi-Party Computation Problems and Their Applications: A Review and Open Problems. — 2001. [1]

Back

4. VE09
Vegge H. Realizing Secure Multiparty Computations. — 2009. [2]

Back

5. SMK11
Sheikh R., Mishra D.K., Kumar B. Secure Multiparty Computation: From Millionaires Problem to Anonymizer // Information Security Journal: A Global Perspective, 20. — 2011. — С. 25—33.

Back

6. RS10
Rohit P, Satyadhar J. Advances in Information Security and Assurance // Springer Berlin / Heidelberg. — 2010.

Back

7. GO97
Goldwasser S. Multi-party computations: Past and present // In Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing, Santa Barbara. — 1997.

Back

8. DA06
Damgard I. Theory and Practice of Multiparty Computation // Lecture Notes in Computer Science. SpringerLink, Berlin. — 2006. — С. 360—364.

Back