Secure Multiparty Computation: From Millionaires Problem to Anonymizer (English)
- New search for: Sheikh, Rashid
- New search for: Mishra, Durgesh Kumar
- New search for: Kumar, Beerendra
- New search for: Sheikh, Rashid
- New search for: Mishra, Durgesh Kumar
- New search for: Kumar, Beerendra
In:
Information Security Journal: A Global Perspective
;
20
, 1
;
25-33
;
2011
- Article (Journal) / Electronic Resource
-
Title:Secure Multiparty Computation: From Millionaires Problem to Anonymizer
-
Contributors:
-
Published in:Information Security Journal: A Global Perspective ; 20, 1 ; 25-33
-
Publisher:
- New search for: Taylor & Francis
-
Publication date:2011-01-01
-
Size:9 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 20, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Microdata Protection Method Through Microaggregation: A Median-Based ApproachKabir, Md Enamul / Wang, Hua et al. | 2011
- 9
-
Establishment of Authenticated Secret Session Keys Using Digital Signature StandardBiswas, G. P. et al. | 2011
- 17
-
Choosing a Biometric for NonrepudiationLagou, Panagiota / Chondrokoukis, Gregory et al. | 2011
- 25
-
Secure Multiparty Computation: From Millionaires Problem to AnonymizerSheikh, Rashid / Mishra, Durgesh Kumar / Kumar, Beerendra et al. | 2011
- 34
-
Social Network Theory: A Comparative Analysis of the Jewish Revolt in Antiquity and the Cyber Terrorism Incident over KosovoMatusitz, Jonathan et al. | 2011
- 45
-
A Novel Methodology for Data Hiding in PDF FilesTiwari, Rajesh Kumar / Sahoo, G. et al. | 2011
- 58
-
Cyber Attack! Is a Counter Attack Warranted?McLaughlin, Kevin L. et al. | 2011