[1]Brin D.The Transparent Society[M].Reading MA:Perseus Books,1998.
[2]Langheinrich M.A Privacy Awareness System for Ubiquitous Computing Environments[C].In 4th International Conference on Ubiquitous Computing(Ubicomp 2002),2002:237-245.
[3]Mukherjee Saha A.Pervasive Computing:A Paradigm for the 21st Century[J].Computer,2003,36(3):25-31.
[4]Goldwasser S.Multi Party Computations:Past and Present[C].Santa Barbara,California,United States:In Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing,1997.
[5]Yao C.Protocols for Secure Computations[C].United States:In Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science,1982.
[6]Goldreich.The Foundations of Cryptography[M].Cambridge UK:Cambridge University Press,2004.
[7]Du W,Atallah M J.Secure Multi-party Computation Problems and Their Applications:A Review and Open Problems[C].Cloudcroft,New Mexico:In Proceedings of the 2001 Workshop on New Security Paradigms,2001.
[8]Chor B,Kushilevitz E,Goldreich O,et al.Private Information Retrieval[C].ACM,1998,45:965-981.
[9]Atallah M J,Du W.Secure Multi-party Computational Geometry[C].In Proceedings of the 7th International Workshop on Algorithms and Data Structures,2001.
[10]Canetti R,Ishai Y,Kumar R,et al.Selective Private Function Evaluation with Applications to Private Statistics[R].Rhode Island,United States:In Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing,Newport,2001.
[11]Clifton C,Kantarcioglu M,Vaidya J,et al.Tools for Privacy Preserving Distributed Data Mining[J].ACM Sigkdd Explor Newsl,2002,4(2):28-34.
[12]Freedman M J,Nissim K,Pinkas B.Efficient Private Matching and Set Intersection[C].In Eurocrypt′04,2004:1-19.
[13]Benaloh J.Dense Probabilistic Encryption[C].In Proceedings of the Workshop on Selected Areas of Cryptography Kingston,1994:120-128.
[14]Paillier P.Public-Key Cryptosystems Based on Composite Degree Residuosity Classes[C].In Eurocrypt′99,1999:223-238.
[15]Naccache D.A New Cryptosystem Based on Higher Residues[C].In Proceedings of the 5th ACM Conf.on Computer and Communication Security,1998:59-66.
[16]Frikken K,Atallah M,Zhang C,et al.Privacy-preserving Credit Checking[J].Vancouver,BC,Canada:In Proceedings of the 6th ACM Conference on Electronic Commerce,2005.
[17]Atallah M J,Li J.Secure Outsourcing of Sequence Comparisons[J].Int.J.Inf.Secur.,2005(4):277-287. |