ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Perfect privacy for two-party protocols
DIMACS Series in Discrete Mathematics and Theoretical Computer Science - Distributed Computing and Cryptography
◽
10.1090/dimacs/002/03
◽
1991
◽
pp. 1-1
◽
Cited By ~ 1
Author(s):
Donald Beaver
Keyword(s):
Perfect Privacy
Download Full-text
Related Documents
Cited By
References
On Perfect Privacy
IEEE Journal on Selected Areas in Information Theory
◽
10.1109/jsait.2021.3053432
◽
2021
◽
pp. 1-1
Author(s):
Borzoo Rassouli
◽
Deniz Gunduz
Keyword(s):
Perfect Privacy
Download Full-text
Perfect Privacy Preserving in Automated Trust Negotiation
2011 IEEE International Conference on Advanced Information Networking and Applications
◽
10.1109/aina.2011.110
◽
2011
◽
Cited By ~ 1
Author(s):
Hiroaki Kikuchi
◽
Tangtisanon Pikulkaew
Keyword(s):
Privacy Preserving
◽
Trust Negotiation
◽
Automated Trust Negotiation
◽
Perfect Privacy
Download Full-text
A Novel Perfect Privacy PIR Scheme for Privacy Critical Applications
Proceedings of International Symposium on Sensor Networks, Systems and Security
◽
10.1007/978-3-319-75683-7_6
◽
2018
◽
pp. 85-95
Author(s):
Radhakrishna Bhat
◽
N. R. Sunitha
Keyword(s):
Perfect Privacy
Download Full-text
Research on a mixed cryptosystem with perfect privacy
2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC)
◽
10.1109/itoec.2017.8122497
◽
2017
◽
Author(s):
Weiqing You
◽
XiaoMing Chen
◽
Jian Qi
◽
Hao Jiang
◽
Wenxi Li
Keyword(s):
Perfect Privacy
Download Full-text
Practitioner’s Corner ∙ GDPR - The Perfect Privacy Storm: You Can Run from the Regulator, but You Cannot Hide from the Consumer
European Data Protection Law Review
◽
10.21552/edpl/2017/2/20
◽
2017
◽
Vol 3
(2)
◽
pp. 251-256
Author(s):
W. Nauwelaerts
Keyword(s):
Perfect Privacy
Download Full-text
On the Perfect Privacy: a Statistical Analysis of Network Traffic Approach
IEEE Communications Letters
◽
10.1109/lcomm.2016.2558182
◽
2016
◽
pp. 1-1
Author(s):
Amir Hossein RezaeiTabar
◽
Abolfazl Diyanat
◽
Ahmad Khonsari
Keyword(s):
Statistical Analysis
◽
Network Traffic
◽
Perfect Privacy
Download Full-text
Face De-identification with perfect privacy protection
2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)
◽
10.1109/mipro.2014.6859756
◽
2014
◽
Cited By ~ 14
Author(s):
Lily Meng
◽
Zongji Sun
Keyword(s):
Privacy Protection
◽
Perfect Privacy
Download Full-text
Fundamental limits of perfect privacy
2015 IEEE International Symposium on Information Theory (ISIT)
◽
10.1109/isit.2015.7282765
◽
2015
◽
Cited By ~ 22
Author(s):
Flavio P. Calmon
◽
Ali Makhdoumi
◽
Muriel Medard
Keyword(s):
Fundamental Limits
◽
Perfect Privacy
Download Full-text
A Novel Perfect Privacy Preserving Single Database Private Information Retrieval With Non-trivial Communication
2017 2nd International Conference On Emerging Computation and Information Technologies (ICECIT)
◽
10.1109/icecit.2017.8453421
◽
2017
◽
Author(s):
Radhakrishna Bhat
◽
N R Sunitha
Keyword(s):
Information Retrieval
◽
Private Information
◽
Privacy Preserving
◽
Private Information Retrieval
◽
Perfect Privacy
Download Full-text
On Perfect Privacy
2018 IEEE International Symposium on Information Theory (ISIT)
◽
10.1109/isit.2018.8437481
◽
2018
◽
Cited By ~ 3
Author(s):
Borzoo Rassouli
◽
Deniz Gunduz
Keyword(s):
Perfect Privacy
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close