The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With cloud computing, the arrival of the era of big data, privacy of data mining has become a hot topic. Data fitting as a basic tool for data mining research data fitting privacy issue is very meaningful. This paper studies the vertical distribution of data, while protecting privacy horizontal distribution of the linear regression problem, a linear regression of the privacy protocol, and protocol...
In this paper, based on the quasi ?-preinvex, semistrictly quasi ?-preinvex, and local quasi ?-preinvex, three characterizations of ?-preinvex function have been obtained on the middle point ?-preinvex. Our results provide new thoughts to verify the ?-preinvex function.
The existing solution to the privacy preserving linear programming, can leak the user's private data when the data is much less. In this paper, the secure multiparty computation is generalized to the problem of privacy-preserving linear programming, and we present a computing protocol of privacy-preserving linear programming. The protocol is applied to consider the problem of linear programming with...
Judging private path is a kind of special privacy-preserving geometric calculation. In this paper, a private-preserving curvet-ellipse position relation determination protocol is proposed based on the Private-Preserving Dot Product Protocol and Millionaires' Protocol in semi-honest model along with analysis of protocol' capability. It can be used to solve the problem about judging private path.
Based on Zhang's short signature scheme without random oracles and k+1-square roots assumption, a new fair contract signing protocol with the off-line semi-Trusted Third Party is given because the disadvantages of existed fair contract signing protocol. The off-line semi-TTP intervenes into the protocol in cases where one party attempts to cheat or simply crashes to make the fair exchange optimistic...
Privacy-Preserving Computational Geometry is a kind of special secure multi-party computation problem. As a special privacy-preserving computational geometry problem, Privacy- Path Determination may be applied in many fields such as military field and commerce field. In this paper, a privacy-preserving line-ellipse position relation determination protocol is developed and based on this protocol, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.