Issue Date | Title | Author(s) | Relation | scopus | WOS | Fulltext/Archive link |
2013 | Floating point arithmetic protocols for constructing secure data analysis application | Liu, Y. C.; Chiang, Y. T.; Hsu, T. -s.; Liau, C. J.; Wang, D. W. | | | | |
2002 | How much privacy? - A system to safe guard personal privacy while releasing database | Chiang, Y. T.; Chiang, Y. C.; Hsu, T. -s.; Liau, C. -J.; Wang, D. W. | | | | |
2006 | Information theoretical analysis of two-party secret computation | Wang, D. W.; Liau, C. J.; Chiang, Y. T.; Hsu, T. -s. | | | | |
2005 | Secrecy of two-party secure computation | Chiang, Y. T.; Wang, D. W.; Liau, C. J.; Hsu, T. -s. | | | | |