Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
---|---|---|---|---|---|---|
2015 | An information-theoretic approach for secure protocol composition | Y.T. Chiang; T.-s. Hsu; C.J. Liau; Y.C. Liu; C.H. Shen; D.W. Wang; J. Zhan | ||||
2002 | How much privacy? - A system to safe guard personal privacy while releasing database | Y.T. Chiang; Y.C. Chiang; T.-s. Hsu; C.-J. Liau; D.W. Wang | ||||
2006 | Information theoretical analysis of two-party secret computation | D.W. Wang; C.J. Liau; Y.T. Chiang; T.-s. Hsu | ||||
2005 | Secrecy of two-party secure computation | Y.T. Chiang; D.W. Wang; C.J. Liau; T.-s. Hsu |