Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
16
views
24
references
Top references
cited by
8
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,218
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Security – ESORICS 2009
Secure Evaluation of Private Linear Branching Programs with Medical Applications
other
Author(s):
Mauro Barni
,
Pierluigi Failla
,
Vladimir Kolesnikov
,
Riccardo Lazzeretti
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Cardiovascular Innovations and Applications
Most cited references
24
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
370
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
309
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System
Ivan Damgård
,
Mads Jurik
(2001)
0
comments
Cited
90
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 424-439
DOI:
10.1007/978-3-642-04444-1_26
SO-VID:
15f20215-35ce-4e13-a8f9-92f85c83643b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
pp. 424
Secure Evaluation of Private Linear Branching Programs with Medical Applications
pp. 37
The Coremelt Attack
pp. 303
A Privacy Preservation Model for Facebook-Style Social Network Systems
pp. 440
Keep a Few: Outsourcing Data While Maintaining Confidentiality
pp. 505
Isolating JavaScript with Filters, Rewriting, and Wrappers
pp. 655
Cumulative Attestation Kernels for Embedded Systems
Similar content
1,218
The increasing inefficiency of private health insurance in Canada.
Authors:
Michael R Law
,
Jillian Kratzer
,
Irfan Dhalla
The relative effectiveness of government and private schools in Pakistan: are girls worse off?
Authors:
Monazza Aslam
The Effects of Global Severe Privation on Cognitive Competence: Extension and Longitudinal Follow-up
Authors:
Celia Beckett
,
Michael Rutter
,
Thomas G O'Connor
…
See all similar
Cited by
8
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Authors:
Vladimir Kolesnikov
,
Ahmad-Reza Sadeghi
,
Thomas Schneider
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring
Authors:
Huang Lin
,
Yuguang Fang
,
Chi Zhang
…
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Authors:
Mauro Barni
,
Pierluigi Failla
,
Vladimir Kolesnikov
…
See all cited by