Privacy-preserving collision detection of two circles
Abstract
References
Index Terms
- Privacy-preserving collision detection of two circles
Recommendations
A Privacy Preserving Protocol for Generation the Common Tangent of Two Circles
IHMSC '14: Proceedings of the 2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics - Volume 01Special secure multi-party computation is a hot topic in recent years' research. Privacy preserving path planning is that how to do path planning without leakage of privacy information. It has a very broad application prospects, but there is little ...
A privacy framework: indistinguishable privacy
EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 WorkshopsIn this paper we illustrate a privacy framework named Indistinguishable Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party ...
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query
The point-inclusion problem is an important secure multi-party computation that it involves two parties, where one has a private point and the other has a private area, and they want to determine whether the point is inside the area without revealing ...
Comments
Information & Contributors
Information
Published In
- Conference Chairs:
- Jianzhong Li,
- Wang-Chien Lee,
- Fabrizio Silvestri
Sponsors
Publisher
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Brussels, Belgium
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 128Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in