Private Data Clustering based on Secure Approximation
スポンサーリンク
概要
- 論文の詳細を見る
- 2006-11-28
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
SAKURAI Kouichi
Department of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Sakurai Kouichi
Department Of Computer Science And Communication Engineering Faculty Of Information Science And Elec
-
SU Chunhua
Dept. of Computer Science and Communication Engineering, Kyushu University
-
BAO Feng
Cryptography and Security Department, Institute for Infocomm Research
-
ZHOU Jianying
Cryptography and Security Department, Institute for Infocomm Research
-
SU Chunhua
Department of Computer Science and Communication Engineering, Kyushu University
-
BAO Feng
Systems and Security Department, Institute for Infocomm Research
-
ZHOU Jianying
Systems and Security Department, Institute for Infocomm Research
-
Bao Feng
Cryptography And Security Department Institute For Infocomm Research
-
Su Chunhua
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Zhou Jianying
Cryptography And Security Department Institute For Infocomm Research
-
Sakurai Kouichi
Department Of Applied Science Faculty Of Engineering 36 Kyushu University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
- Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds