[1] Goldreich O. Foundations of Cryptography: Basic Applications[M]. Cambridge: Cambridge University Press, 2004, Chapter 7. [2] Sang Ying-peng, Shen Hong, and Tian Hui. Privacy- preserving tuple matching in distributed database[J].IEEE Transactions on Knowledge and Data Engineering.2009, 21(12):1767-1782 [3] Zhu You-wen, Huang Liu-sheng, and Yang Wei. Relation of PPAtMP and scalar product protocol and their applications[C]. The 15th IEEE Symposium on Computers and Communications, Riccione, Italy, 2010: 184-189. [4] 周水庚, 李丰, 陶宇飞, 等. 面向数据库应用的隐私保护研究综述[J]. 计算机学报, 2009, 32(5): 847-861. Zhou Shui-geng, Li Feng, and Tao Yu-fei, et al.. Privacy preservation in database application: a survey[J].Chinese Journal of Computers.2009, 32(5):847-861 [5] Kerschbaum F and Schaad A. Privacy-preserving social network analysis for criminal investigations[C]. Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM New York, NY, USA, 2008: 9-14. [6] Li Shun-dong and Dai Yi-qi. Secure two-party computational geometry[J], Journal of Computer Science and Technology, 2005, 20(2): 258-263. [7] Li Dong, Huang Liu-sheng, and Yang Wei, et al.. A practical solution for privacy-preserving approximate convex hulls problem[C]. International Conference on Communications and Mobile Computing, Kunming, China, Jan. 6-8, 2009: 539-544. [8] 陈志立, 黄刘生, 于振山, 等. 文本信息隐藏的统计检测算法[J]. 小型微型计算机系统, 2008, 29(12): 2199-2201. Chen Zhi-li, Huang Liu-sheng, and Y Zhen-shan et al.. Text information hiding detecting algorithm based on statistics[J]. Journal of Chinese Computer Systems, 2008, 29(12): 2199-2201. [9] 陈志立. 语言隐写术的分析与设计研究[D]. [博士论文], 中国科学技术大学, 2009. [10] Chen Zhi-li. Research on Analysis and Design of Linguistic Steganography[D]. [Ph.D. dissertation], University of Science and Technology of China, 2009. [11] Taskiran C, Topkara U, and Topkara M, et al.. Attacks on lexical natural language steganography systems[C]. SPIE International Conference on Security, Steganography and Watermarking of Multimedia Contents, San Jose, Canada, 2006: 97-105. [12] 周继君, 杨著, 等. 文本信息隐藏检测算法研究[J]. 通信学报, 2004, 25(12): 97-101. Zhou Ji-jun and Yang Zhu, et al.. Research on the detecting algorithm of text document information hiding[J]. Journal on Communications, 2004, 25(12): 97-101. [13] Chapman M, Davida G, and Rennhard M. A practical and effective approach to large-scale automated linguistic steganography[C]. The 4th International Conference on Information Security, Malaga, Spain, Oct. 1-3, 2001: 156-167. [14] Maher K. TEXTO. ftp://ftp.funet.fi/pub/crypt/ steganography/texto.tar.gz, 2007. [15] Manning C and Schutze H. Foundations of statistical natural language processing[M]. Cambridge: MITPress, London, 2005, Chapter 5. [16] P Paillier. Public key cryptosystems based on composite degree residuosity classes[C]. Advances in Cryptology- EUROCRYPT, Prague, Czech Republic, 1999: 223-238. [17] Goethals B, Laur S, and Lipmaa H, et al.. On private scalar product computation for privacy-preserving data mining[C]. The 7th Annual International Conference in Information Security and Cryptology, Seoul, Korea, Dec. 2-3, 2004: 104-120.
|