Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
17
views
24
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,121
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2009
Secure Evaluation of Private Linear Branching Programs with Medical Applications
other
Author(s):
Mauro Barni
,
Pierluigi Failla
,
Vladimir Kolesnikov
,
Riccardo Lazzeretti
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Cardiovascular Innovations and Applications
Most cited references
24
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
370
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System
Ivan Damgård
,
Mads Jurik
(2001)
0
comments
Cited
90
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 424-439
DOI:
10.1007/978-3-642-04444-1_26
SO-VID:
15f20215-35ce-4e13-a8f9-92f85c83643b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
pp. 424
Secure Evaluation of Private Linear Branching Programs with Medical Applications
pp. 37
The Coremelt Attack
pp. 303
A Privacy Preservation Model for Facebook-Style Social Network Systems
pp. 440
Keep a Few: Outsourcing Data While Maintaining Confidentiality
pp. 505
Isolating JavaScript with Filters, Rewriting, and Wrappers
pp. 655
Cumulative Attestation Kernels for Embedded Systems
Similar content
2,121
The wellbeing of language teachers in the private sector: An ecological perspective
Authors:
Sarah Mercer
Tamizaje neonatal en Colombia: la experiencia de un programa privado en Bogotá
Translated title: Newborn screening in Colombia: The experience of a private program in Bogotá
Authors:
Jaime E. Bernal
,
Martha Lucía Tamayo
,
Ignacio Briceño
…
The Privatization of Health Care System in Saudi Arabia
Authors:
Redwanur Rahman
See all similar
Cited by
8
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Authors:
Vladimir Kolesnikov
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Authors:
Huang Lin
,
Yuguang Fang
,
Chi Zhang
…
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Authors:
Mauro Barni
,
Pierluigi Failla
,
Vladimir Kolesnikov
…
See all cited by