Journal of the ACM / the Theory of Computing / Communications of the ACM / Journal of Cryptology / Theory of Computing / Lecture Notes in Computer Science / /
Technology
oblivious transfer protocol / two-party protocol / generic Yao protocol / The multi-party protocols / ID3 algorithm / generic two-party protocol / e.g. public key encryption / private key / simpler OPE protocol / secure computation protocol / html / multi-party protocols / encryption / proxy oblivious transfer protocol / cryptography / constant-round protocol / distributed algorithm / public key / basic protocol / unconditionally secure protocols / data mining algorithms / Privacy preserving protocols / greedy algorithm / short protocol / generic protocol / data mining / secure protocol / privacy preserving protocol / oblivious transfer protocols / data mining algorithm / basic ID3 algorithm / web server / basic algorithm / /