| Document Date: 2014-02-15 11:17:08 Open Document File Size: 371,14 KBShare Result on Facebook
Company Amazon / Google / SRI International / Microsoft / / Currency pence / / Event FDA Phase / / Facility Sparsehash library / Microsoft Research University of Calgary / / IndustryTerm intersection algorithm / malicious server / server-side set intersection protocol / software implementations / data-mining purposes / semi-honest protocol / client processing steps / tamper-proof hardware / simulatable coin tossing protocol / intersection size-hiding protocol / honest server / untrusted server / semi-honest server / multi-party protocol / real-world applications / covert and malicious server / cloud-based services / semi-hoenest server / privacy-preserving data mining / coin-tossing protocol / et al. protocol / intersection protocol / heavy machinery / set intersection protocol / coin tossing protocol / non-private protocol / / OperatingSystem Linux / Microsoft Windows / / Organization Pi / PSI / University of Calgary / / Person Dong / Chen / Wen / / Position single player to control the outcome / / Product PSI / Theorems / D2 / O(n / Fig / / ProgrammingLanguage C++ / / Technology Huang et al. protocol / LAN / second protocol / PSI protocols / two-party protocol / Linux / server-aided protocol / server-side set intersection protocol / secret key / two-party PSI protocol / encryption / non-private protocol / multi-party protocol / Server-aided PSI protocol / coin tossing protocol / intersection algorithm / existing algorithms / data mining / third protocol / semi-honest protocol / simulation / sever-aided PET protocols / fourth protocol / set intersection protocol / intersection protocol / PSI protocol / coin-tossing protocol / simulatable coin tossing protocol / Dong et al. protocol / /
SocialTag |