[1] Yao Qizhi. Protocols for secure computations//Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
[2] Goldreich O, Micali S, Wigderson A. How to play any mental game//The 19th Annual ACM Conference on Theory of Computing. New York: ACM, 1987: 218-229.
[3] Du Wenliang, Atallah M J. Privacy-preserving cooperative scientific computations//Proceedings of the 14th IEEE Computer Security Workshop. Nova Scotia: IEEE Computer Society Press, 2001: 273-282.
[4] Mikhail J A, Du Wenliang. Secure multi-party computational geometry//Proceedings of the 7th International Workshop on Algorithms and Data Structures. Berlin: Springer, 2001: 165-179.
[5] Lindell Y, Pinkas B. Privacy preserving data mining[J]. Journal of Cryptology, 2002, 15(3): 177-206.
[6] 刘文, 罗守山, 陈萍. 利用El Gamal密码体制解决安全多方多数据排序问题[J]. 通信学报, 2007, 28(10):1-5. Liu Wen, Luo Shoushan, Chen Ping. Solution for secure multi-party multi-data ranking problem based on El Gamal encryption[J]. Journal of China Institute of Communications, 2007, 28(10): 1-5.
[7] 刘文, 罗守山, 陈萍. 基于滑动窗口和交换加密函数解决SMP的新方案[J]. 计算机工程, 2007, 33(22): 163-171. Liu Wen, Luo Shoushan, Chen Ping. Solution to SMP based on sliding window and commutation encryption function[J]. Computer Engineering, 2007, 33(22): 163-171.
[8] 罗永龙, 黄刘生, 荆巍巍, 等. 空间几何对象相对位置判定中的私有信息保护[J]. 计算机研究与发展, 2006, 43(3): 410-416. Luo Yonglong, Huang Liusheng, Jing Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416. |