de Montjoye, Yves-Alexandre; Ramadorai, Tarun; Valletti, Tommaso; Walther, Ansgar Privacy, adoption, and truthful reporting: a simple theory of contact tracing applications. (English) Zbl 07308215 Econ. Lett. 198, Article ID 109676, 5 p. (2021). MSC: 92D30 91C99 PDF BibTeX XML Cite \textit{Y.-A. de Montjoye} et al., Econ. Lett. 198, Article ID 109676, 5 p. (2021; Zbl 07308215) Full Text: DOI
Beimel, Amos; Nissim, Kobbi; Stemmer, Uri Learning privately with labeled and unlabeled examples. (English) Zbl 07303847 Algorithmica 83, No. 1, 177-215 (2021). MSC: 68W 05C PDF BibTeX XML Cite \textit{A. Beimel} et al., Algorithmica 83, No. 1, 177--215 (2021; Zbl 07303847) Full Text: DOI
Hils, Maximilian; Böhme, Rainer Watching the weak link into your home: an inspection and monitoring toolkit for TR-069 (abridged conference version). (English) Zbl 07314393 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 233-253 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{M. Hils} and \textit{R. Böhme}, Lect. Notes Comput. Sci. 12147, 233--253 (2020; Zbl 07314393) Full Text: DOI
Hoang, Anh-Tu; Carminati, Barbara; Ferrari, Elena Cluster-based anonymization of knowledge graphs. (English) Zbl 07314387 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 104-123 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{A.-T. Hoang} et al., Lect. Notes Comput. Sci. 12147, 104--123 (2020; Zbl 07314387) Full Text: DOI
Bentafat, Elmahdi; Rathore, M. Mazhar; Bakiras, Spiridon A practical system for privacy-preserving video surveillance. (English) Zbl 07314383 Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-57877-0/pbk; 978-3-030-57878-7/ebook). Lecture Notes in Computer Science 12147, 21-39 (2020). MSC: 68M25 94A60 PDF BibTeX XML Cite \textit{E. Bentafat} et al., Lect. Notes Comput. Sci. 12147, 21--39 (2020; Zbl 07314383) Full Text: DOI
Wang, Di; Gaboardi, Marco; Smith, Adam; Xu, Jinhui Empirical risk minimization in the non-interactive local model of differential privacy. (English) Zbl 07307479 J. Mach. Learn. Res. 21, Paper No. 200, 39 p. (2020). MSC: 68T05 PDF BibTeX XML Cite \textit{D. Wang} et al., J. Mach. Learn. Res. 21, Paper No. 200, 39 p. (2020; Zbl 07307479) Full Text: Link
Barthe, Gilles; Chadha, Rohit; Jagannath, Vishal; Sistla, A. Prasad; Viswanathan, Mahesh Deciding differential privacy for programs with finite inputs and outputs. (English) Zbl 07299465 Proceedings of the 2020 35th annual ACM/IEEE symposium on logic in computer science, LICS 2020, virtual event, July 8–11, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-7104-9). 141-154 (2020). MSC: 68 PDF BibTeX XML Cite \textit{G. Barthe} et al., in: Proceedings of the 2020 35th annual ACM/IEEE symposium on logic in computer science, LICS 2020, virtual event, July 8--11, 2020. New York, NY: Association for Computing Machinery (ACM). 141--154 (2020; Zbl 07299465) Full Text: DOI
Feldman, Vitaly Does learning require memorization? A short tale about a long tail. (English) Zbl 07298301 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 954-959 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{V. Feldman}, in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 954--959 (2020; Zbl 07298301) Full Text: DOI
Dagan, Yuval; Feldman, Vitaly Interaction is necessary for distributed learning with privacy or communication constraints. (English) Zbl 07298261 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 450-462 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{Y. Dagan} and \textit{V. Feldman}, in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 450--462 (2020; Zbl 07298261) Full Text: DOI
Feldman, Vitaly; Koren, Tomer; Talwar, Kunal Private stochastic convex optimization: optimal rates in linear time. (English) Zbl 07298260 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 439-449 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{V. Feldman} et al., in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 439--449 (2020; Zbl 07298260) Full Text: DOI
Edmonds, Alexander; Nikolov, Aleksandar; Ullman, Jonathan The power of factorization mechanisms in local and central differential privacy. (English) Zbl 07298259 Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-6979-4). 425-438 (2020). MSC: 68Qxx PDF BibTeX XML Cite \textit{A. Edmonds} et al., in: Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC '20, Chicago, IL, USA, June 22--26, 2020. New York, NY: Association for Computing Machinery (ACM). 425--438 (2020; Zbl 07298259) Full Text: DOI
Pan, Feng; Liu, Wenchao; Yang, Xiaoyuan; Zhou, Tanping; Tu, Guangsheng Privacy-preserving recommender algorithm based on homomorphic encryption. (Chinese. English summary) Zbl 07295957 J. Zhengzhou Univ., Nat. Sci. Ed. 52, No. 3, 62-67 (2020). MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{F. Pan} et al., J. Zhengzhou Univ., Nat. Sci. Ed. 52, No. 3, 62--67 (2020; Zbl 07295957) Full Text: DOI
Cai, Liang; Duan, Hao; Yan, Meng; Xia, Xin Private data protection scheme for consortium blockchain based on two-layer cooperation. (Chinese. English summary) Zbl 07295751 J. Softw. 31, No. 8, 2557-2573 (2020). MSC: 68P25 68P20 PDF BibTeX XML Cite \textit{L. Cai} et al., J. Softw. 31, No. 8, 2557--2573 (2020; Zbl 07295751) Full Text: DOI
Tan, Zuowen; Zhang, Lianfu Survey on privacy preserving techniques for machine learning. (Chinese. English summary) Zbl 07295739 J. Softw. 31, No. 7, 2127-2156 (2020). MSC: 68T05 PDF BibTeX XML Cite \textit{Z. Tan} and \textit{L. Zhang}, J. Softw. 31, No. 7, 2127--2156 (2020; Zbl 07295739) Full Text: DOI
Bowen, Claire Mckay; Liu, Fang Comparative study of differentially private data synthesis methods. (English) Zbl 07292514 Stat. Sci. 35, No. 2, 280-307 (2020). MSC: 62 PDF BibTeX XML Cite \textit{C. M. Bowen} and \textit{F. Liu}, Stat. Sci. 35, No. 2, 280--307 (2020; Zbl 07292514) Full Text: DOI Euclid
Kumar, Amod; Singh, G. N.; Vishwakarma, Gajendra K. An efficient survey technique for estimating the proportion and sensitivity attributes in a dichotomous finite population. (English) Zbl 07291451 Proc. Natl. Acad. Sci. India, Sect. A, Phys. Sci. 90, No. 2, 281-287 (2020). MSC: 62D05 PDF BibTeX XML Cite \textit{A. Kumar} et al., Proc. Natl. Acad. Sci. India, Sect. A, Phys. Sci. 90, No. 2, 281--287 (2020; Zbl 07291451) Full Text: DOI
Zhou, Yaqin; Tang, Shaojie Differentially private distributed learning. (English) Zbl 07290875 INFORMS J. Comput. 32, No. 3, 779-789 (2020). MSC: 68T05 PDF BibTeX XML Cite \textit{Y. Zhou} and \textit{S. Tang}, INFORMS J. Comput. 32, No. 3, 779--789 (2020; Zbl 07290875) Full Text: DOI
Gupta, Sat; Aloraini, Badr; Qureshi, Muhammad Nouman; Khalil, Sadia Variance estimation using randomized response technique. (English) Zbl 07289277 REVSTAT 18, No. 2, 165-176 (2020). MSC: 62D05 62J10 PDF BibTeX XML Cite \textit{S. Gupta} et al., REVSTAT 18, No. 2, 165--176 (2020; Zbl 07289277) Full Text: Link
Rohde, Angelika; Steinberger, Lukas Geometrizing rates of convergence under local differential privacy constraints. (English) Zbl 07285309 Ann. Stat. 48, No. 5, 2646-2670 (2020). Reviewer: Glauber Márcio Silveira Pereira (Ceará) MSC: 62R10 62G05 62G07 62C20 PDF BibTeX XML Cite \textit{A. Rohde} and \textit{L. Steinberger}, Ann. Stat. 48, No. 5, 2646--2670 (2020; Zbl 07285309) Full Text: DOI Euclid
Attia, Mohamed Adel; Kumar, Deepak; Tandon, Ravi The capacity of private information retrieval from uncoded storage constrained databases. (English) Zbl 1453.94130 IEEE Trans. Inf. Theory 66, No. 11, 6617-6634 (2020). MSC: 94A62 68P20 68P27 PDF BibTeX XML Cite \textit{M. A. Attia} et al., IEEE Trans. Inf. Theory 66, No. 11, 6617--6634 (2020; Zbl 1453.94130) Full Text: DOI
Sun, Hua; Jafar, Syed Ali On the capacity of locally decodable codes. (English) Zbl 1452.94049 IEEE Trans. Inf. Theory 66, No. 10, 6566-6579 (2020). MSC: 94A29 68P20 68P27 PDF BibTeX XML Cite \textit{H. Sun} and \textit{S. A. Jafar}, IEEE Trans. Inf. Theory 66, No. 10, 6566--6579 (2020; Zbl 1452.94049) Full Text: DOI
Jia, Zhuqing; Jafar, Syed Ali On the asymptotic capacity of X-secure T-private information retrieval with graph-based replicated storage. (English) Zbl 1452.94032 IEEE Trans. Inf. Theory 66, No. 10, 6280-6296 (2020). MSC: 94A16 94C15 68P20 68P27 PDF BibTeX XML Cite \textit{Z. Jia} and \textit{S. A. Jafar}, IEEE Trans. Inf. Theory 66, No. 10, 6280--6296 (2020; Zbl 1452.94032) Full Text: DOI
Haitner, Iftach; Nissim, Kobbi; Omri, Eran; Shaltiel, Ronen; Silbak, Jad Computational two-party correlation: a dichotomy for key-agreement protocols. (English) Zbl 07282214 SIAM J. Comput. 49, No. 6, 1041-1082 (2020). MSC: 68Q01 PDF BibTeX XML Cite \textit{I. Haitner} et al., SIAM J. Comput. 49, No. 6, 1041--1082 (2020; Zbl 07282214) Full Text: DOI
Li, Songze; Avestimehr, Salman Coded computing: mitigating fundamental bottlenecks in large-scale distributed computing and machine learning. (English) Zbl 07275153 Found. Trends Commun. Inf. Theory 17, No. 1, 1-148 (2020). MSC: 94 PDF BibTeX XML Cite \textit{S. Li} and \textit{S. Avestimehr}, Found. Trends Commun. Inf. Theory 17, No. 1, 1--148 (2020; Zbl 07275153) Full Text: DOI
Ayed, Fadhel; Battiston, Marco; Camerlenghi, Federico An information theoretic approach to post randomization methods under differential privacy. (English) Zbl 1452.62151 Stat. Comput. 30, No. 5, 1347-1361 (2020). MSC: 62B10 62D05 90C05 PDF BibTeX XML Cite \textit{F. Ayed} et al., Stat. Comput. 30, No. 5, 1347--1361 (2020; Zbl 1452.62151) Full Text: DOI
Liu, Xiao-Kang; Zhang, Ji-Feng; Wang, Jimin Differentially private consensus algorithm for continuous-time heterogeneous multi-agent systems. (English) Zbl 1453.93223 Automatica 122, Article ID 109283, 10 p. (2020). MSC: 93D50 93A16 93B70 PDF BibTeX XML Cite \textit{X.-K. Liu} et al., Automatica 122, Article ID 109283, 10 p. (2020; Zbl 1453.93223) Full Text: DOI
Li, Nan; Kolmanovsky, Ilya; Girard, Anouck Detection-averse optimal and receding-horizon control for Markov decision processes. (English) Zbl 1453.93243 Automatica 122, Article ID 109278, 8 p. (2020). MSC: 93E20 90C40 PDF BibTeX XML Cite \textit{N. Li} et al., Automatica 122, Article ID 109278, 8 p. (2020; Zbl 1453.93243) Full Text: DOI
Altafini, Claudio A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics. (English) Zbl 1451.93011 Automatica 122, Article ID 109253, 13 p. (2020). MSC: 93A16 93D50 93C10 PDF BibTeX XML Cite \textit{C. Altafini}, Automatica 122, Article ID 109253, 13 p. (2020; Zbl 1451.93011) Full Text: DOI
Liu, Joseph K. (ed.); Cui, Hui (ed.) Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30–December 2, 2020. Proceedings. (English) Zbl 07268294 Lecture Notes in Computer Science 12248. Cham: Springer (ISBN 978-3-030-55303-6/pbk; 978-3-030-55304-3/ebook). xvi, 676 p. (2020). MSC: 68-06 68M25 68P27 94A60 94A62 00B25 PDF BibTeX XML Cite \textit{J. K. Liu} (ed.) and \textit{H. Cui} (ed.), Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30--December 2, 2020. Proceedings. Cham: Springer (2020; Zbl 07268294) Full Text: DOI
Liang, Wenjuan; Chen, Hong; Wu, Yuncheng; Zhao, Dan; Li, Cuiping Differential privacy under continual observation. (Chinese. English summary) Zbl 07267141 J. Softw. 31, No. 6, 1761-1785 (2020). MSC: 68P25 94A60 PDF BibTeX XML Cite \textit{W. Liang} et al., J. Softw. 31, No. 6, 1761--1785 (2020; Zbl 07267141) Full Text: DOI
Zhang, Ao; Bai, Xiaoying Survey of research and practices on blockchain privacy protection. (Chinese. English summary) Zbl 07267131 J. Softw. 31, No. 5, 1406-1434 (2020). MSC: 68P25 PDF BibTeX XML Cite \textit{A. Zhang} and \textit{X. Bai}, J. Softw. 31, No. 5, 1406--1434 (2020; Zbl 07267131) Full Text: DOI
Zhang, Chao; Liang, Ying; Fang, Haoshan Social network information recommendation method of supporting privacy protection. (Chinese. English summary) Zbl 07267013 J. Shandong Univ., Nat. Sci. 55, No. 3, 9-18 (2020). MSC: 91D30 68P25 PDF BibTeX XML Cite \textit{C. Zhang} et al., J. Shandong Univ., Nat. Sci. 55, No. 3, 9--18 (2020; Zbl 07267013) Full Text: DOI
Wang, Han; Wang, Xu’an; Zhou, Neng; Liu, Yudong Blockchain based public verifiable scheme for sharing data. (Chinese. English summary) Zbl 07266758 J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1-7 (2020). MSC: 68P20 68P25 PDF BibTeX XML Cite \textit{H. Wang} et al., J. Guangxi Norm. Univ., Nat. Sci. 38, No. 2, 1--7 (2020; Zbl 07266758) Full Text: DOI
Chattopadhyay, Eshan; Goyal, Vipul; Li, Xin Nonmalleable extractors and codes, with their many tampered extensions. (English) Zbl 1452.94063 SIAM J. Comput. 49, No. 5, 999-1040 (2020). MSC: 94A60 94B60 05D40 68R05 PDF BibTeX XML Cite \textit{E. Chattopadhyay} et al., SIAM J. Comput. 49, No. 5, 999--1040 (2020; Zbl 1452.94063) Full Text: DOI
Yan, Lili; Liu, Dongmei; Zhang, Shibin; Chang, Yan; Wan, Guogen Practical quantum database private query protocol with classical database owner. (English) Zbl 07265337 Int. J. Theor. Phys. 59, No. 9, 3002-3008 (2020). MSC: 68P PDF BibTeX XML Cite \textit{L. Yan} et al., Int. J. Theor. Phys. 59, No. 9, 3002--3008 (2020; Zbl 07265337) Full Text: DOI
Ye, Tian-Yu; Li, Hong-Kun; Hu, Jia-Li Multi-user quantum private query protocol. (English) Zbl 07265325 Int. J. Theor. Phys. 59, No. 9, 2867-2874 (2020). MSC: 68P PDF BibTeX XML Cite \textit{T.-Y. Ye} et al., Int. J. Theor. Phys. 59, No. 9, 2867--2874 (2020; Zbl 07265325) Full Text: DOI
Bostanoǧlu, Belgin Ergenç; Öztürk, Ahmet Cumhur Minimizing information loss in shared data: hiding frequent patterns with multiple sensitive support thresholds. (English) Zbl 07260682 Stat. Anal. Data Min. 13, No. 4, 309-323 (2020). MSC: 62 68 PDF BibTeX XML Cite \textit{B. E. Bostanoǧlu} and \textit{A. C. Öztürk}, Stat. Anal. Data Min. 13, No. 4, 309--323 (2020; Zbl 07260682) Full Text: DOI
Bassily, Raef; Nissim, Kobbi; Stemmer, Uri; Thakurta, Abhradeep Practical locally private heavy hitters. (English) Zbl 07255047 J. Mach. Learn. Res. 21, Paper No. 16, 42 p. (2020). MSC: 68T05 PDF BibTeX XML Cite \textit{R. Bassily} et al., J. Mach. Learn. Res. 21, Paper No. 16, 42 p. (2020; Zbl 07255047) Full Text: Link
Chen, Zhen; Wang, Zhiying; Jafar, Syed Ali The capacity of T-private information retrieval with private side information. (English) Zbl 1446.68061 IEEE Trans. Inf. Theory 66, No. 8, 4761-4773 (2020). MSC: 68P20 68P27 94A62 PDF BibTeX XML Cite \textit{Z. Chen} et al., IEEE Trans. Inf. Theory 66, No. 8, 4761--4773 (2020; Zbl 1446.68061) Full Text: DOI
Chen, Zhen; Wang, Zhiying; Jafar, Syed Ali The asymptotic capacity of private search. (English) Zbl 1446.68048 IEEE Trans. Inf. Theory 66, No. 8, 4709-4721 (2020). MSC: 68P10 68P20 68P27 94A62 PDF BibTeX XML Cite \textit{Z. Chen} et al., IEEE Trans. Inf. Theory 66, No. 8, 4709--4721 (2020; Zbl 1446.68048) Full Text: DOI
Banawan, Karim; Ulukus, Sennur Private information retrieval through wiretap channel II: privacy meets security. (English) Zbl 1446.94168 IEEE Trans. Inf. Theory 66, No. 7, 4129-4149 (2020). MSC: 94A62 94B05 68P27 PDF BibTeX XML Cite \textit{K. Banawan} and \textit{S. Ulukus}, IEEE Trans. Inf. Theory 66, No. 7, 4129--4149 (2020; Zbl 1446.94168) Full Text: DOI
Raviv, Netanel; Tamo, Itzhak; Yaakobi, Eitan Private information retrieval in graph-based replication systems. (English) Zbl 1448.94109 IEEE Trans. Inf. Theory 66, No. 6, 3590-3602 (2020). MSC: 94A16 68P27 94C15 PDF BibTeX XML Cite \textit{N. Raviv} et al., IEEE Trans. Inf. Theory 66, No. 6, 3590--3602 (2020; Zbl 1448.94109) Full Text: DOI
Padakandla, Arun; Kumar, P. R.; Szpankowski, Wojciech The trade-off between privacy and fidelity via Ehrhart theory. (English) Zbl 1448.94108 IEEE Trans. Inf. Theory 66, No. 4, 2549-2569 (2020). MSC: 94A16 68P27 PDF BibTeX XML Cite \textit{A. Padakandla} et al., IEEE Trans. Inf. Theory 66, No. 4, 2549--2569 (2020; Zbl 1448.94108) Full Text: DOI
Savaux, Julien; Vion, Julien; Piechowiak, Sylvain; Mandiau, René; Matsui, Toshihiro; Hirayama, Katsutoshi; Yokoo, Makoto; Elmane, Shakre; Silaghi, Marius Privacy stochastic games in distributed constraint reasoning. (English) Zbl 07249511 Ann. Math. Artif. Intell. 88, No. 7, 691-715 (2020). MSC: 68T01 PDF BibTeX XML Cite \textit{J. Savaux} et al., Ann. Math. Artif. Intell. 88, No. 7, 691--715 (2020; Zbl 07249511) Full Text: DOI
Gilboa-Freedman, Gail; Smorodinsky, Rann On the behavioral implications of differential privacy. (English) Zbl 07248856 Theor. Comput. Sci. 841, 84-93 (2020). MSC: 68Q PDF BibTeX XML Cite \textit{G. Gilboa-Freedman} and \textit{R. Smorodinsky}, Theor. Comput. Sci. 841, 84--93 (2020; Zbl 07248856) Full Text: DOI
Beaude, Olivier; Benchimol, Pascal; Gaubert, Stéphane; Jacquot, Paulin; Oudjane, Nadia A privacy-preserving method to optimize distributed resource allocation. (English) Zbl 1448.91130 SIAM J. Optim. 30, No. 3, 2303-2336 (2020). MSC: 91B32 PDF BibTeX XML Cite \textit{O. Beaude} et al., SIAM J. Optim. 30, No. 3, 2303--2336 (2020; Zbl 1448.91130) Full Text: DOI Link
Ma, Min-Yao; Liu, Zhuo; Xu, Yi Quantum protocol for privacy preserving Hamming distance problem of DNA sequences. (English) Zbl 1447.81080 Int. J. Theor. Phys. 59, No. 7, 2101-2111 (2020). MSC: 81P68 68Q07 92D20 81P94 81P70 81P73 PDF BibTeX XML Cite \textit{M.-Y. Ma} et al., Int. J. Theor. Phys. 59, No. 7, 2101--2111 (2020; Zbl 1447.81080) Full Text: DOI
Ye, Tian-Yu; Li, Hong-Kun; Hu, Jia-Li Semi-quantum private query protocol without invoking the measurement capability of classical user. (English) Zbl 07243888 Int. J. Theor. Phys. 59, No. 7, 2044-2051 (2020). MSC: 68P PDF BibTeX XML Cite \textit{T.-Y. Ye} et al., Int. J. Theor. Phys. 59, No. 7, 2044--2051 (2020; Zbl 07243888) Full Text: DOI
Liu, Bai; Zhang, Mingwu; Shi, Runhua Quantum secure multi-party private set intersection cardinality. (English) Zbl 1447.81096 Int. J. Theor. Phys. 59, No. 7, 1992-2007 (2020). MSC: 81P94 81P45 81P68 PDF BibTeX XML Cite \textit{B. Liu} et al., Int. J. Theor. Phys. 59, No. 7, 1992--2007 (2020; Zbl 1447.81096) Full Text: DOI
Bultel, Xavier; Dreier, Jannik; Dumas, Jean-Guillaume; Lafourcade, Pascal A faster cryptographer’s Conspiracy Santa. (English) Zbl 1453.68081 Theor. Comput. Sci. 839, 122-134 (2020). MSC: 68Q10 68P27 68Q17 68Q25 91A12 91A68 94A60 PDF BibTeX XML Cite \textit{X. Bultel} et al., Theor. Comput. Sci. 839, 122--134 (2020; Zbl 1453.68081) Full Text: DOI
Lefebvre, Dimitri; Hadjicostis, Christoforos N. Privacy and safety analysis of timed stochastic discrete event systems using Markovian trajectory-observers. (English) Zbl 1448.93198 Discrete Event Dyn. Syst. 30, No. 3, 413-440 (2020). MSC: 93C65 93E03 93B53 93-10 PDF BibTeX XML Cite \textit{D. Lefebvre} and \textit{C. N. Hadjicostis}, Discrete Event Dyn. Syst. 30, No. 3, 413--440 (2020; Zbl 1448.93198) Full Text: DOI
Bhardwaj, Rupali; Aggarwal, Ashutosh Hiding clinical information in medical images: an enhanced encrypted reversible data hiding algorithm grounded on hierarchical absolute moment block truncation coding. (English) Zbl 07238140 Multidimensional Syst. Signal Process. 31, No. 3, 1051-1074 (2020). MSC: 94 PDF BibTeX XML Cite \textit{R. Bhardwaj} and \textit{A. Aggarwal}, Multidimensional Syst. Signal Process. 31, No. 3, 1051--1074 (2020; Zbl 07238140) Full Text: DOI
Liu, Ruixuan; Chen, Hong; Guo, Ruoyang; Zhao, Dan; Liang, Wenjuan; Li, Cuiping Survey on privacy attacks and defenses in machine learning. (Chinese. English summary) Zbl 1449.68067 J. Softw. 31, No. 3, 866-892 (2020). MSC: 68T05 68P27 68T09 68-02 PDF BibTeX XML Cite \textit{R. Liu} et al., J. Softw. 31, No. 3, 866--892 (2020; Zbl 1449.68067) Full Text: DOI
Bonnecaze, Alexis; Rolland, Robert Blind transfer of personal data achieving privacy. (English) Zbl 07225643 Daras, Nicholas J. (ed.) et al., Computational mathematics and variational analysis. Cham: Springer (ISBN 978-3-030-44624-6/hbk; 978-3-030-44625-3/ebook). Springer Optimization and Its Applications 159, 25-32 (2020). MSC: 65Jxx 49Jxx PDF BibTeX XML Cite \textit{A. Bonnecaze} and \textit{R. Rolland}, Springer Optim. Appl. 159, 25--32 (2020; Zbl 07225643) Full Text: DOI
Cheon, Jung Hee; Kim, Duhyeong; Park, Jai Hyun Towards a practical cluster analysis over encrypted data. (English) Zbl 1453.94070 Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 227-249 (2020). MSC: 94A60 PDF BibTeX XML Cite \textit{J. H. Cheon} et al., Lect. Notes Comput. Sci. 11959, 227--249 (2020; Zbl 1453.94070) Full Text: DOI
Alshareef, Hanaa; Pardo, Raúl; Schneider, Gerardo; Picazo-Sanchez, Pablo A collaborative access control framework for online social networks. (English) Zbl 1451.68098 J. Log. Algebr. Methods Program. 114, Article ID 100562, 25 p. (2020). MSC: 68P27 68M25 91D30 PDF BibTeX XML Cite \textit{H. Alshareef} et al., J. Log. Algebr. Methods Program. 114, Article ID 100562, 25 p. (2020; Zbl 1451.68098) Full Text: DOI
Pinto, Alexandre Miranda An introduction to the use of zk-SNARKs in blockchains. (English) Zbl 07215927 Pardalos, Panos (ed.) et al., Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6–9, 2019. Cham: Springer (ISBN 978-3-030-37109-8/hbk; 978-3-030-37110-4/ebook). Springer Proceedings in Business and Economics, 233-249 (2020). MSC: 68P25 94A60 68Q 91B64 PDF BibTeX XML Cite \textit{A. M. Pinto}, in: Mathematical research for blockchain economy. Proceedings of the 1st international conference on mathematical research for blockchain economy, MARBLE 2019, Santorini, Greece, May 6--9, 2019. Cham: Springer. 233--249 (2020; Zbl 07215927) Full Text: DOI
Park, Mijung; Foulds, James; Chaudhuri, Kamalika; Welling, Max Variational Bayes in private settings (VIPS). (English) Zbl 1452.62986 J. Artif. Intell. Res. (JAIR) 68, 109-157 (2020). MSC: 62R07 62F15 68P27 PDF BibTeX XML Cite \textit{M. Park} et al., J. Artif. Intell. Res. (JAIR) 68, 109--157 (2020; Zbl 1452.62986) Full Text: DOI
Fan, Yifan; Zhang, Huiming; Yan, Ting Asymptotic theory for differentially private generalized \(\beta\)-models with parameters increasing. (English) Zbl 07214271 Stat. Interface 13, No. 3, 385-398 (2020). MSC: 62F12 05C80 62E20 62F10 PDF BibTeX XML Cite \textit{Y. Fan} et al., Stat. Interface 13, No. 3, 385--398 (2020; Zbl 07214271) Full Text: DOI
Gong, Maoguo; Pan, Ke; Xie, Yu; Qin, A. K.; Tang, Zedong Preserving differential privacy in deep neural networks with relevance-based adaptive noise imposition. (English) Zbl 1434.68507 Neural Netw. 125, 131-141 (2020). MSC: 68T07 68P27 PDF BibTeX XML Cite \textit{M. Gong} et al., Neural Netw. 125, 131--141 (2020; Zbl 1434.68507) Full Text: DOI
Mengibaev, Ulugbek; Jia, Xiaodan; Ma, Yeqing The impact of interactive dependence on privacy protection behavior based on evolutionary game. (English) Zbl 07200791 Appl. Math. Comput. 379, Article ID 125231, 6 p. (2020). MSC: 91 90 PDF BibTeX XML Cite \textit{U. Mengibaev} et al., Appl. Math. Comput. 379, Article ID 125231, 6 p. (2020; Zbl 07200791) Full Text: DOI
Butucea, Cristina; Dubois, Amandine; Kroll, Martin; Saumard, Adrien Local differential privacy: elbow effect in optimal density estimation and adaptation over Besov ellipsoids. (English) Zbl 1444.62045 Bernoulli 26, No. 3, 1727-1764 (2020). Reviewer: Wiesław Dziubdziela (Miedziana Góra) MSC: 62G07 62G20 62G05 42C40 PDF BibTeX XML Cite \textit{C. Butucea} et al., Bernoulli 26, No. 3, 1727--1764 (2020; Zbl 1444.62045) Full Text: DOI Euclid
Gilboa-Freedman, Gail; Smorodinsky, Rann On the properties that characterize privacy. (English) Zbl 1437.91164 Math. Soc. Sci. 103, 59-68 (2020). MSC: 91B08 91B06 PDF BibTeX XML Cite \textit{G. Gilboa-Freedman} and \textit{R. Smorodinsky}, Math. Soc. Sci. 103, 59--68 (2020; Zbl 1437.91164) Full Text: DOI
Wang, Di; Xu, Jinhui Tight lower bound of sparse covariance matrix estimation in the local differential privacy model. (English) Zbl 1433.68129 Theor. Comput. Sci. 815, 47-59 (2020). MSC: 68P27 62H12 68Q17 PDF BibTeX XML Cite \textit{D. Wang} and \textit{J. Xu}, Theor. Comput. Sci. 815, 47--59 (2020; Zbl 1433.68129) Full Text: DOI
Zhang, Liang Feng; Safavi-Naini, Reihaneh Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. (English) Zbl 07182908 Des. Codes Cryptography 88, No. 4, 677-709 (2020). MSC: 94A60 68Q60 PDF BibTeX XML Cite \textit{L. F. Zhang} and \textit{R. Safavi-Naini}, Des. Codes Cryptography 88, No. 4, 677--709 (2020; Zbl 07182908) Full Text: DOI
Lu, Yang; Zhu, Minghui On privacy preserving data release of linear dynamic networks. (English) Zbl 1436.93058 Automatica 115, Article ID 108839, 13 p. (2020). MSC: 93B70 93C73 93C95 93C05 PDF BibTeX XML Cite \textit{Y. Lu} and \textit{M. Zhu}, Automatica 115, Article ID 108839, 13 p. (2020; Zbl 1436.93058) Full Text: DOI
Liu, Hai; Wu, Zhenqiang; Peng, Changgen; Tian, Feng; Lu, Laifeng Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms. (English) Zbl 1432.68135 Theor. Comput. Sci. 816, 195-220 (2020). MSC: 68P27 PDF BibTeX XML Cite \textit{H. Liu} et al., Theor. Comput. Sci. 816, 195--220 (2020; Zbl 1432.68135) Full Text: DOI
Liu, Wen; Li, Yu-Gang; Wang, Yong-Bin A novel quantum solution to privacy-preserving lexicographical string sorting problem. (English) Zbl 1435.68103 Int. J. Theor. Phys. 59, No. 3, 754-762 (2020). MSC: 68Q12 68P10 68P27 81P68 81P94 PDF BibTeX XML Cite \textit{W. Liu} et al., Int. J. Theor. Phys. 59, No. 3, 754--762 (2020; Zbl 1435.68103) Full Text: DOI
Fischer, Orr; Oshman, Rotem; Zwick, Uri Public vs. private randomness in simultaneous multi-party communication complexity. (English) Zbl 1437.68066 Theor. Comput. Sci. 810, 72-81 (2020). MSC: 68Q11 68P27 PDF BibTeX XML Cite \textit{O. Fischer} et al., Theor. Comput. Sci. 810, 72--81 (2020; Zbl 1437.68066) Full Text: DOI
Wang, Di; Xu, Jinhui Principal component analysis in the local differential privacy model. (English) Zbl 1436.68100 Theor. Comput. Sci. 809, 296-312 (2020). MSC: 68P27 62H25 PDF BibTeX XML Cite \textit{D. Wang} and \textit{J. Xu}, Theor. Comput. Sci. 809, 296--312 (2020; Zbl 1436.68100) Full Text: DOI
Yu, Fang; Qiu, Daowen; Wang, Xiaoming; Li, Qin; Li, Lvzhou; Gruska, Jozef Security improvements of several basic quantum private query protocols with \(O(\log N)\) communication complexity. (English) Zbl 1436.68101 Theor. Comput. Sci. 807, 330-340 (2020). MSC: 68P27 68P15 68Q11 81P94 PDF BibTeX XML Cite \textit{F. Yu} et al., Theor. Comput. Sci. 807, 330--340 (2020; Zbl 1436.68101) Full Text: DOI
Shekhar, Shashank; Brafman, Ronen I. Representing and planning with interacting actions and privacy. (English) Zbl 07153706 Artif. Intell. 278, Article ID 103200, 19 p. (2020). MSC: 68T PDF BibTeX XML Cite \textit{S. Shekhar} and \textit{R. I. Brafman}, Artif. Intell. 278, Article ID 103200, 19 p. (2020; Zbl 07153706) Full Text: DOI
Konrad, Kai A. Attacking and defending multiple valuable secrets in a big data world. (English) Zbl 1431.91076 Eur. J. Oper. Res. 280, No. 3, 1122-1129 (2020). MSC: 91A80 PDF BibTeX XML Cite \textit{K. A. Konrad}, Eur. J. Oper. Res. 280, No. 3, 1122--1129 (2020; Zbl 1431.91076) Full Text: DOI
Zhan, Justin; Matwin, Stan Secure data mining (to appear). (English) Zbl 05501013 New York, NY: Springer (ISBN 978-0-387-87965-9/hbk; 978-0-387-87966-6/ebook). 280 p. (2020). MSC: 68-01 68P27 68T05 PDF BibTeX XML Cite \textit{J. Zhan} and \textit{S. Matwin}, Secure data mining (to appear). New York, NY: Springer (2020; Zbl 05501013)
Monedero, David Rebollo; Mezher, Ahmad Mohamad; Colomé, Xavier Casanova; Forné, Jordi; Soriano, Miguel Efficient \(k\)-anonymous microaggregation of multivariate numerical data via principal component analysis. (English) Zbl 07306152 Inf. Sci. 503, 417-443 (2019). MSC: 62H25 62R07 62-08 PDF BibTeX XML Cite \textit{D. R. Monedero} et al., Inf. Sci. 503, 417--443 (2019; Zbl 07306152) Full Text: DOI
Li, Xiaoguang; Li, Hui; Zhu, Hui; Huang, Muyang The optimal upper bound of the number of queries for Laplace mechanism under differential privacy. (English) Zbl 1453.68072 Inf. Sci. 503, 219-237 (2019). MSC: 68P27 68P30 PDF BibTeX XML Cite \textit{X. Li} et al., Inf. Sci. 503, 219--237 (2019; Zbl 1453.68072) Full Text: DOI
Wang, Linjie; Tian, Youliang; Zhang, Duo; Lu, Yanhua Constant-round authenticated and dynamic group key agreement protocol for D2D group communications. (English) Zbl 1453.94122 Inf. Sci. 503, 61-71 (2019). MSC: 94A60 PDF BibTeX XML Cite \textit{L. Wang} et al., Inf. Sci. 503, 61--71 (2019; Zbl 1453.94122) Full Text: DOI
Guo, Taolin; Luo, Junzhou; Dong, Kai; Yang, Ming Locally differentially private item-based collaborative filtering. (English) Zbl 1453.68071 Inf. Sci. 502, 229-246 (2019). MSC: 68P27 68U35 PDF BibTeX XML Cite \textit{T. Guo} et al., Inf. Sci. 502, 229--246 (2019; Zbl 1453.68071) Full Text: DOI
Mukherjee, Sankar; Gupta, Daya Sagar; Biswas, G. P. An efficient and batch verifiable conditional privacy-preserving authentication scheme for VANETs using lattice. (English) Zbl 07296841 Computing 101, No. 12, 1763-1788 (2019). MSC: 11T71 94A60 94A62 81T25 PDF BibTeX XML Cite \textit{S. Mukherjee} et al., Computing 101, No. 12, 1763--1788 (2019; Zbl 07296841) Full Text: DOI
Wei, Yu; Lv, Siyi; Guo, Xiaojie; Liu, Zheli; Huang, Yanyu; Li, Bo FSSE: forward secure searchable encryption with keyed-block chains. (English) Zbl 1451.68095 Inf. Sci. 500, 113-126 (2019). MSC: 68P25 68P20 PDF BibTeX XML Cite \textit{Y. Wei} et al., Inf. Sci. 500, 113--126 (2019; Zbl 1451.68095) Full Text: DOI
Zheng, Yandong; Lu, Rongxing; Li, Beibei; Shao, Jun; Yang, Haomiao; Raymond Choo, Kim-Kwang Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. (English) Zbl 1451.68097 Inf. Sci. 498, 91-105 (2019). MSC: 68P25 68P27 PDF BibTeX XML Cite \textit{Y. Zheng} et al., Inf. Sci. 498, 91--105 (2019; Zbl 1451.68097) Full Text: DOI
Zheng, Xu; Chen, Aiguo; Luo, Guangchun; Tian, Ling; Cai, Zhipeng Privacy-preserved distinct content collection in human-assisted ubiquitous computing systems. (English) Zbl 1451.68100 Inf. Sci. 493, 91-104 (2019). MSC: 68P27 PDF BibTeX XML Cite \textit{X. Zheng} et al., Inf. Sci. 493, 91--104 (2019; Zbl 1451.68100) Full Text: DOI
Cai, Ning; Kou, Steven Econometrics with privacy preservation. (English) Zbl 07265987 Oper. Res. 67, No. 4, 905-926 (2019). MSC: 62P20 62G08 PDF BibTeX XML Cite \textit{N. Cai} and \textit{S. Kou}, Oper. Res. 67, No. 4, 905--926 (2019; Zbl 07265987) Full Text: DOI
Zhang, Xiaoyu; Jiang, Tao; Li, Kuan-Ching; Castiglione, Aniello; Chen, Xiaofeng New publicly verifiable computation for batch matrix multiplication. (English) Zbl 1443.68060 Inf. Sci. 479, 664-678 (2019). MSC: 68P27 68M11 94A60 PDF BibTeX XML Cite \textit{X. Zhang} et al., Inf. Sci. 479, 664--678 (2019; Zbl 1443.68060) Full Text: DOI
Sang, Anqi; Shen, Meng; Zhu, Liehuang; Liu, Sheng; Yin, Shu; Xiao, Yao Research on blockchain-based multi-party collaborative security authentication mechanism. (Chinese. English summary) Zbl 1449.68036 J. Nanjing Univ. Inf. Sci. Technol., Nat. Sci. 11, No. 5, 581-589 (2019). MSC: 68P25 68P27 94A62 PDF BibTeX XML Cite \textit{A. Sang} et al., J. Nanjing Univ. Inf. Sci. Technol., Nat. Sci. 11, No. 5, 581--589 (2019; Zbl 1449.68036) Full Text: DOI
Cao, Yongzhi A survey on differential privacy in probabilistic systems. (Chinese. English summary) Zbl 1449.68039 J. Guangzhou Univ., Nat. Sci. 18, No. 4, 75-82 (2019). MSC: 68P27 PDF BibTeX XML Cite \textit{Y. Cao}, J. Guangzhou Univ., Nat. Sci. 18, No. 4, 75--82 (2019; Zbl 1449.68039)
Meng, Lingyu; Ye, Ayong Differential perturbation mechanism for position correlation. (Chinese. English summary) Zbl 1449.68040 J. Fujian Norm. Univ., Nat. Sci. 35, No. 6, 21-28 (2019). MSC: 68P27 PDF BibTeX XML Cite \textit{L. Meng} and \textit{A. Ye}, J. Fujian Norm. Univ., Nat. Sci. 35, No. 6, 21--28 (2019; Zbl 1449.68040) Full Text: DOI
Gong, Linming; Li, Shundong; Dou, Jiawei; Wang, Daoshun Private social-willing detection. (Chinese. English summary) Zbl 1449.68030 J. Softw. 30, No. 11, 3535-3548 (2019). MSC: 68P25 68M12 68P27 PDF BibTeX XML Cite \textit{L. Gong} et al., J. Softw. 30, No. 11, 3535--3548 (2019; Zbl 1449.68030) Full Text: DOI
Xu, Jian; Wang, Andi; Bi, Meng; Zhou, Fucai Privacy-preserving \(k\)-nearest neighbor classifier. (Chinese. English summary) Zbl 1449.68075 J. Softw. 30, No. 11, 3503-3517 (2019). MSC: 68T05 62H30 68P25 68P27 PDF BibTeX XML Cite \textit{J. Xu} et al., J. Softw. 30, No. 11, 3503--3517 (2019; Zbl 1449.68075) Full Text: DOI
Zheng, Jingzhu; Yang, Haining; Su, Ye; Qin, Jing A blindly public verifiable outsourcing scheme for matrix multiplication. (Chinese. English summary) Zbl 1449.68042 J. Shandong Univ., Nat. Sci. 54, No. 11, 1-11 (2019). MSC: 68P27 65F99 68M11 PDF BibTeX XML Cite \textit{J. Zheng} et al., J. Shandong Univ., Nat. Sci. 54, No. 11, 1--11 (2019; Zbl 1449.68042) Full Text: DOI
Yang, Gaoming; Gong, Chen; Fang, Xianjin; Ge, Bin; Su, Shuzhi Local differential privacy protection for frequent sequence mining. (Chinese. English summary) Zbl 1449.68041 J. Harbin Eng. Univ. 40, No. 11, 1903-1910 (2019). MSC: 68P27 PDF BibTeX XML Cite \textit{G. Yang} et al., J. Harbin Eng. Univ. 40, No. 11, 1903--1910 (2019; Zbl 1449.68041) Full Text: DOI
Ünal, Ali Burak; Akgün, Mete; Pfeifer, Nico A framework with randomized encoding for a fast privacy preserving calculation of non-linear kernels for machine learning applications in precision medicine. (English) Zbl 1437.68154 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 493-511 (2019). MSC: 68T05 68P27 92C50 PDF BibTeX XML Cite \textit{A. B. Ünal} et al., Lect. Notes Comput. Sci. 11829, 493--511 (2019; Zbl 1437.68154) Full Text: DOI
Datta, Amit; Joye, Marc; Fawaz, Nadia Private data aggregation over selected subsets of users. (English) Zbl 1437.68050 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 375-391 (2019). MSC: 68P25 68P27 PDF BibTeX XML Cite \textit{A. Datta} et al., Lect. Notes Comput. Sci. 11829, 375--391 (2019; Zbl 1437.68050) Full Text: DOI
Haböck, Ulrich; Krenn, Stephan Breaking and fixing anonymous credentials for the cloud. (English) Zbl 1437.68053 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 249-269 (2019). MSC: 68P25 68P27 94A62 PDF BibTeX XML Cite \textit{U. Haböck} and \textit{S. Krenn}, Lect. Notes Comput. Sci. 11829, 249--269 (2019; Zbl 1437.68053) Full Text: DOI
Yuen, Tsz Hon PAChain: private, authenticated and auditable consortium blockchain. (English) Zbl 1444.94123 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 214-234 (2019). MSC: 94A62 PDF BibTeX XML Cite \textit{T. H. Yuen}, Lect. Notes Comput. Sci. 11829, 214--234 (2019; Zbl 1444.94123) Full Text: DOI
Sadhya, Debanjan; Chakraborty, Bodhi A quantitative study of attribute based correlation in micro-databases and its effects on privacy. (English) Zbl 1443.68058 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 651-659 (2019). MSC: 68P27 68P15 68P30 PDF BibTeX XML Cite \textit{D. Sadhya} and \textit{B. Chakraborty}, Lect. Notes Comput. Sci. 11547, 651--659 (2019; Zbl 1443.68058) Full Text: DOI
Pan, Dongxue; Liang, Bei; Li, Hongda; Ni, Peifang Witness encryption with (weak) unique decryption and message indistinguishability: constructions and applications. (English) Zbl 1439.94054 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 609-619 (2019). MSC: 94A60 68M25 68P27 PDF BibTeX XML Cite \textit{D. Pan} et al., Lect. Notes Comput. Sci. 11547, 609--619 (2019; Zbl 1439.94054) Full Text: DOI
Naito, Yusuke A highly secure MAC from tweakable blockciphers with support for short tweaks. (English) Zbl 1439.94052 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 588-606 (2019). MSC: 94A60 94A62 68M25 68P27 PDF BibTeX XML Cite \textit{Y. Naito}, Lect. Notes Comput. Sci. 11547, 588--606 (2019; Zbl 1439.94052) Full Text: DOI
Schabhüser, Lucas; Butin, Denis; Buchmann, Johannes Function-dependent commitments from homomorphic authenticators. (English) Zbl 1443.68059 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 399-418 (2019). MSC: 68P27 94A62 PDF BibTeX XML Cite \textit{L. Schabhüser} et al., Lect. Notes Comput. Sci. 11547, 399--418 (2019; Zbl 1443.68059) Full Text: DOI
Ichikawa, Atsunori; Ogata, Wakaha; Hamada, Koki; Kikuchi, Ryo Efficient secure multi-party protocols for decision tree classification. (English) Zbl 1443.68039 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 362-380 (2019). MSC: 68M25 68P27 68Q11 68T05 94A60 PDF BibTeX XML Cite \textit{A. Ichikawa} et al., Lect. Notes Comput. Sci. 11547, 362--380 (2019; Zbl 1443.68039) Full Text: DOI