A new efficient privacy-preserving scalar product protocol, AusDM, pp.209-214, 2007. ,
Sharp bounds for the psi function and harmonic numbers, Mathematical inequalities and applications, 2011. ,
DOI : 10.7153/mia-14-77
Completeness theorems for non-cryptographic faulttolerant distributed computation, STOC'88, 1988. ,
Dense probabilistic encryption, SAC'94, 1994. ,
Semi-homomorphic Encryption and Multiparty Computation, EUROCRYPT'11, 2011. ,
DOI : 10.1007/978-3-642-20465-4_11
An efficient cryptographic protocol verifier based on prolog rules, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001., 2001. ,
DOI : 10.1109/CSFW.2001.930138
Demonstrating Possession of a Discrete Logarithm Without Revealing it, CRYPTO'86, 1986. ,
DOI : 10.1007/3-540-47721-7_14
Multiparty Computation from Somewhat Homomorphic Encryption, CRYPTO'12, 2012. ,
DOI : 10.1007/978-3-642-32009-5_38
An undecidability result for AGh, Theoretical Computer Science, vol.368, issue.1-2, 2006. ,
DOI : 10.1016/j.tcs.2006.08.018
Computing multi-party trust privately, Proceedings of the 2010 ACM Symposium on Applied Computing, SAC '10, 2010. ,
DOI : 10.1145/1774088.1774401
Privacy-preserving cooperative statistical analysis, ACSAC '01, pp.102-110, 2001. ,
A practical approach to solve Secure Multi-party Computation problems, Proceedings of the 2002 workshop on New security paradigms , NSPW '02, 2002. ,
DOI : 10.1145/844102.844125
Matrix powers algorithm for trust evaluation in PKI architectures, STM'12, ESORICS 2012, 2012. ,
Aggregating Trust Using Triangular Norms in the KeyNote Trust Management System, STM'2010, 2010. ,
DOI : 10.1007/978-3-642-22444-7_7
Benaloh???s Dense Probabilistic Encryption Revisited, AFRICACRYPT'11, 2011. ,
DOI : 10.1007/978-3-642-13190-5_2
On Private Scalar Product Computation for Privacy-Preserving Data Mining, ICISC'04, 2005. ,
DOI : 10.1007/11496618_9
Propagation of trust and distrust, Proceedings of the 13th conference on World Wide Web , WWW '04, 2004. ,
DOI : 10.1145/988672.988727
A formal-semanticsbased calculus of trust, IEEE Internet Computing, 2010. ,
Probabilistic logic under uncertainty, 2007. ,
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties, FPS'15, 2015. ,
DOI : 10.1007/978-3-319-30303-1_9
URL : https://hal.archives-ouvertes.fr/hal-01306395
Secure computation for privacy preserving data mining, Encyclopedia of Data Warehousing and Mining, 2009. ,
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes, Wireless Personal Communications, vol.24, issue.1, pp.66559-575, 2012. ,
DOI : 10.1007/s11277-012-0734-z
Efficient and secure delegation of linear algebra, 2011. ,
Wire-Tap Channel II, EUROCRYPT'84, 1984. ,
DOI : 10.1002/j.1538-7305.1984.tb00072.x
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EURO- CRYPT'99, 1999. ,
DOI : 10.1007/3-540-48910-X_16
How to share a secret, Communications of the ACM, vol.22, issue.11, p.22, 1979. ,
DOI : 10.1145/359168.359176
Towards Empirical Aspects of Secure Scalar Product, 2008 International Conference on Information Security and Assurance (isa 2008), 2008. ,
DOI : 10.1109/ISA.2008.78
Protocols for secure computations, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), 1982. ,
DOI : 10.1109/SFCS.1982.38