TY - JOUR AU - Hornik, K. AU - Stinchcombe, M. AU - White, H. PY - 1989 DA - 1989// TI - Multilayer feedforward networks are universal approximators JO - Neural Networks VL - 2 UR - https://doi.org/10.1016/0893-6080(89)90020-8 DO - 10.1016/0893-6080(89)90020-8 ID - Hornik1989 ER - TY - CHAP AU - Rivest, R. L. AU - Adleman, L. AU - Dertouzos, M. L. PY - 1978 DA - 1978// TI - On data banks and privacy homomorphisms BT - Foundations of Secure Computation PB - Academic Press CY - New York, NY, USA ID - Rivest1978 ER - TY - JOUR AU - Pinkas, B. PY - 2002 DA - 2002// TI - Cryptographic techniques for privacy-preserving data mining JO - ACM SIGKDD Explorations Newsletter VL - 4 UR - https://doi.org/10.1145/772862.772865 DO - 10.1145/772862.772865 ID - Pinkas2002 ER - TY - CHAP AU - Goldreich, O. AU - Micali, S. AU - Wigderson, A. PY - 1987 DA - 1987// TI - How to play any mental game or a completeness theorem for protocols with honest majority BT - Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC '87) PB - ACM Press CY - New York, NY, USA ID - Goldreich1987 ER - TY - CHAP AU - Chaum, D. AU - Crépeau, C. AU - Damgård, I. PY - 1988 DA - 1988// TI - Multiparty unconditionally secure protocols BT - Proceedings of the 20th Annual ACM Symposium on Theory of Computing (STOC '88) PB - ACM Press CY - Chicago, Ill, USA UR - https://doi.org/10.1145/62212.62214 DO - 10.1145/62212.62214 ID - Chaum1988 ER - TY - JOUR AU - Lindell, Y. AU - Pinkas, B. PY - 2000 DA - 2000// TI - Privacy preserving data mining JO - Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '00) VL - 1880 ID - Lindell2000 ER - TY - CHAP AU - Agrawal, R. AU - Srikant, R. PY - 2000 DA - 2000// TI - Privacy-preserving data mining BT - Proceedings of the ACM SIGMOD International Conference on Management of Data PB - ACM Press CY - Dallas, Tex, USA ID - Agrawal2000 ER - TY - JOUR AU - Chang, Y. -. C. AU - Lu, C. -. J. PY - 2005 DA - 2005// TI - Oblivious polynomial evaluation and oblivious neural learning JO - Theoretical Computer Science VL - 341 UR - https://doi.org/10.1016/j.tcs.2005.03.049 DO - 10.1016/j.tcs.2005.03.049 ID - Chang2005 ER - TY - CHAP AU - Laur, S. AU - Lipmaa, H. AU - Mielikäihen, T. PY - 2006 DA - 2006// TI - Cryptographically private support vector machines BT - Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06) PB - ACM Press CY - Philadelphia, Pa, USA UR - https://doi.org/10.1145/1150402.1150477 DO - 10.1145/1150402.1150477 ID - Laur2006 ER - TY - CHAP AU - Kantarcioglu, M. AU - Vaidya, J. PY - 2003 DA - 2003// TI - Privacy preserving naive bayes classifier for horizontally partitioned data BT - Proceedings of the Workshop on Privacy Preserving Data Mining ID - Kantarcioglu2003 ER - TY - CHAP AU - Yang, Z. AU - Wright, R. N. PY - 2005 DA - 2005// TI - Improved privacy-preserving Bayesian network parameter learning on vertically partitioned data BT - Proceedings of the 21st International Conference on Data Engineering Workshops (ICDEW '05) PB - IEEE Computer Society CY - Tokyo, Japan UR - https://doi.org/10.1109/ICDE.2005.230 DO - 10.1109/ICDE.2005.230 ID - Yang2005 ER - TY - CHAP AU - Wright, R. AU - Yang, Z. PY - 2004 DA - 2004// TI - Privacy-preserving Bayesian network structure computation on distributed heterogeneous data BT - Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '04) PB - ACM Press CY - Seattle, Wash, USA ID - Wright2004 ER - TY - CHAP AU - Jagannathan, G. AU - Wright, R. N. PY - 2005 DA - 2005// TI - Privacy-preserving distributed k-means clustering over arbitrarily partitioned data BT - Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (KDD '05) PB - ACM Press CY - Chicago, Ill, USA UR - https://doi.org/10.1145/1081870.1081942 DO - 10.1145/1081870.1081942 ID - Jagannathan2005 ER - TY - CHAP AU - Yao, A. C. PY - 1982 DA - 1982// TI - Protocols for secure computations BT - Proceedings of the 23rd Annual Symposium on Foundations of Computer Science ID - Yao1982 ER - TY - CHAP AU - Yao, A. PY - 1986 DA - 1986// TI - How to generate and exchange secrets BT - Proceedings of the 27th Annual Symposium on Foundations of Computer Science (FOCS '86) ID - Yao1986 ER - TY - CHAP AU - Paillier, P. PY - 1999 DA - 1999// TI - Public-key cryptosystems based on composite degree residuosity classes BT - Proceedings of International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '99) PB - Springer CY - Prague, Czech Republic ID - Paillier1999 ER - TY - CHAP AU - Barni, M. AU - Orlandi, C. AU - Piva, A. PY - 2006 DA - 2006// TI - A privacy-preserving protocol for neural-network-based computation BT - Proceedings of the 8th Multimedia and Security Workshop (MM & Sec '06) PB - ACM Press CY - Geneva, Switzerland ID - Barni2006 ER - TY - JOUR AU - Goldwasser, S. AU - Micali, S. PY - 1984 DA - 1984// TI - Probabilistic encryption JO - Journal of Computer and System Sciences VL - 28 UR - https://doi.org/10.1016/0022-0000(84)90070-9 DO - 10.1016/0022-0000(84)90070-9 ID - Goldwasser1984 ER - TY - CHAP AU - Damgård, I. AU - Jurik, M. PY - 2001 DA - 2001// TI - A generalisation, a simplification and some applications of Paillier's probabilistic public-key system BT - Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography (PKC '01) ID - Damgård2001 ER - TY - BOOK AU - Catalano, D. PY - 2002 DA - 2002// TI - The bit security of Paillier's encryption scheme and a new, efficient, public key cryptosystem, Ph.D. thesis PB - Università di Catania CY - Catania, Italy ID - Catalano2002 ER - TY - CHAP AU - Goethals, B. AU - Laur, S. AU - Lipmaa, H. AU - Mielikäinen, T. PY - 2004 DA - 2004// TI - On private scalar product computation for privacy-preserving data mining BT - Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC '04) ID - Goethals2004 ER - TY - JOUR AU - Cox, I. J. AU - Linnartz, J. -. P. M. G. PY - 1997 DA - 1997// TI - Public watermarks and resistance to tampering JO - Proceedings the 4th IEEE International Conference on Image Processing (ICIP '97) VL - 3 UR - https://doi.org/10.1109/ICIP.1997.632226 DO - 10.1109/ICIP.1997.632226 ID - Cox1997 ER - TY - JOUR AU - Kalker, T. AU - Linnartz, J. -. P. M. G. AU - van Dijk, M. PY - 1998 DA - 1998// TI - Watermark estimation through detector analysis JO - Proceedings of IEEE International Conference on Image Processing (ICIP '98) VL - 1 ID - Kalker1998 ER - TY - JOUR AU - Dolev, D. AU - Dwork, C. AU - Naor, M. PY - 2000 DA - 2000// TI - Nonmalleable cryptography JO - SIAM Journal on Computing VL - 30 UR - https://doi.org/10.1137/S0097539795291562 DO - 10.1137/S0097539795291562 ID - Dolev2000 ER - TY - BOOK AU - Mitchell, T. M. PY - 1997 DA - 1997// TI - Machine Learning PB - McGraw-Hill CY - New York, NY, USA ID - Mitchell1997 ER - TY - JOUR AU - Fouque, P. -. A. AU - Stern, J. AU - Wackers, J. -. G. PY - 2002 DA - 2002// TI - CryptoComputing with rationals JO - Proceedings of the 6th International Conference on Financial-Cryptography (FC '02) VL - 2357 UR - https://doi.org/10.1007/3-540-36504-4_10 DO - 10.1007/3-540-36504-4_10 ID - Fouque2002 ER - TY - JOUR AU - Gorman, R. P. AU - Sejnowski, T. J. PY - 1988 DA - 1988// TI - Analysis of hidden units in a layered network trained to classify sonar targets JO - Neural Networks VL - 1 UR - https://doi.org/10.1016/0893-6080(88)90023-8 DO - 10.1016/0893-6080(88)90023-8 ID - Gorman1988 ER -