Private Data Clustering based on Secure Approximation
スポンサーリンク
概要
- 論文の詳細を見る
- 2006-11-28
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
SU Chunhua
Dept. of Computer Science and Communication Engineering, Kyushu University
-
BAO Feng
Cryptography and Security Department, Institute for Infocomm Research
-
ZHOU Jianying
Cryptography and Security Department, Institute for Infocomm Research
-
SU Chunhua
Department of Computer Science and Communication Engineering, Kyushu University
-
BAO Feng
Systems and Security Department, Institute for Infocomm Research
-
ZHOU Jianying
Systems and Security Department, Institute for Infocomm Research
-
Bao Feng
Cryptography And Security Department Institute For Infocomm Research
-
Su Chunhua
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Zhou Jianying
Cryptography And Security Department Institute For Infocomm Research
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- A reliability analysis based scheduling algorithm in heterogeneous system
- A Flexible User-centric Resource Scheduling Algorithm
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- Analysis and Comparison of Crytographic Techniques in E-voting and E-auction
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Reliable Key Distribution Scheme for Lossy Channels
- D-031 Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Special Section on Cryptography and Information Security
- Analysis and Design for Private Message Board Systems
- On the Complexity of the Discrete Logarithm for a General Finite Group (Special Section on Cryptography and Information Security)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
- On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost(Application)(Cryptography and Information Security)
- Analysis and Design for Private Message Board Systems (Applications) (Cryptography and Information Security)
- Special Section on Discrete Mathematics and Its Applications
- Timing Attacks against a Parallelized RSA Implementation (特集:プライバシを保護するコンピュータセキュリティ技術)
- Securing Provenance of Distributed Processes in an Untrusted Environment
- Equivalence problem and automorphisms of some abelian branched coverings of the Riemann sphere