Public Key Cryptography – PKC 2004
From MaRDI portal
Publication:5901819
DOI10.1007/b95631zbMath1198.94075OpenAlexW2482419090MaRDI QIDQ5901819
Helger Lipmaa, Markus Jakobsson, Andris Ambainis
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95631
privacypollingoblivious transferrandomized response techniquebinary symmetric channelprivacy-preserving data-mining
Related Items (7)
On some connections between statistics and cryptology ⋮ Basing cryptographic protocols on tamper-evident seals ⋮ Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol ⋮ Communication Optimal Tardos-Based Asymmetric Fingerprinting ⋮ Surveys with negative questions for sensitive items ⋮ A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services ⋮ Sample size determination for the polychotomous randomized response model for sensitive questions in a stratified two-stage sampling survey
This page was built for publication: Public Key Cryptography – PKC 2004