2008 |
8 | EE | Yitao Duan,
John F. Canny:
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining.
SDM 2008: 265-276 |
2007 |
7 | EE | Yitao Duan,
John F. Canny,
Justin Z. Zhan:
Efficient Privacy-Preserving Association Rule Mining: P4P Style.
CIDM 2007: 654-660 |
6 | EE | Yitao Duan,
John F. Canny:
Scalable Secure Bidirectional Group Communication.
INFOCOM 2007: 875-883 |
5 | EE | Yitao Duan,
John F. Canny:
Practical private computation of vector addition-based functions.
PODC 2007: 326-327 |
2006 |
4 | EE | Yitao Duan,
John F. Canny:
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.
CT-RSA 2006: 244-261 |
3 | EE | Yitao Duan,
John F. Canny:
From Commodity to Value: A Privacy-Preserving e-Business Architecture.
ICEBE 2006: 488-495 |
2004 |
2 | EE | Yitao Duan,
John F. Canny:
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments.
Privacy Enhancing Technologies 2004: 167-185 |
2002 |
1 | EE | Ben Y. Zhao,
Yitao Duan,
Ling Huang,
Anthony D. Joseph,
John Kubiatowicz:
Brocade: Landmark Routing on Overlay Networks.
IPTPS 2002: 34-44 |