Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,360,334 papers from all fields of science
Search
Sign In
Create Free Account
Privacy-preserving computational geometry
Known as:
Secure computational geometry
, Secure multi-party geometric computation
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Alice and Bob
Convex hull
Point in polygon
Range searching
Expand
Broader (1)
Computational geometry
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
A privacy-preserving angle equality determination protocol and its applications
Tao Geng
,
Xixi Yan
,
Yan Wang
,
Bin Lv
2014
Corpus ID: 62770528
With the fast growth of the network, more and more cooperation opportunities come out in distributed systems. Privacy attracts…
Expand
2012
2012
Two privacy-preserving protocols for point-curve relation
Liang Liu
,
Chunying Wu
,
Shundong Li
2012
Corpus ID: 122101494
Numerous privacy-preserving issues have emerged along with the fast development of Internet, both in theory and in real-life…
Expand
2012
2012
Privacy-preserving Judgment of the Intersection for Convex Polygons
Yifei Yao
,
Shurong Ning
,
M. Tian
,
Wei Yang
Journal of Computers
2012
Corpus ID: 18596938
As the basic issues of computational geometry, intersection and union of convex polygons can solve lots of problems, such as…
Expand
2012
2012
Privacy-preserving in the Determination of Polygonal Similarity
Jie Biao
2012
Corpus ID: 63036680
Privacy-Preserving computational geometry problem refers to several users computing a cooperative task,where no user prefers his…
Expand
2011
2011
Privacy-Preserving Computational Geometry Problems on Conic Sections
K. Liang
,
Bo Yang
,
He Dake
,
Min Zhou
2011
Corpus ID: 15386116
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. In recent years…
Expand
2010
2010
Privacy-Preserving Segment-Ellipse Intersect-Determination Protocol
Ling Tong
,
Wen-jun Luo
,
Zu-feng Fu
,
Chang-gen Peng
2nd International Conference on E-business and…
2010
Corpus ID: 8747486
Privacy-Preserving Computational Geometry is a kind of special secure multi-party computation problem. As a special privacy…
Expand
2010
2010
Protocol for privacy-preserving intersect-determination of line segment and elliptical
Tong Ling
2010
Corpus ID: 63435936
Privacy-preserving computational geometry is a kind of special SMC issue.As a kind of special privacy-preserving geometric…
Expand
2009
2009
A Secure Protocol for Determining Whether Two Spacial Spheres Intersect
Liu Yong-bin
2009
Corpus ID: 63902686
Secure multi-party computation is one of research focuses in information security field.Privacy-preserving computational geometry…
Expand
2009
2009
Design and Analysis of Private-Preserving Dot Product Protocol
Ting Wang
,
Wenjun Luo
International Conference on Electronic Computer…
2009
Corpus ID: 15070762
Private-preserving shared dot product protocol is an important protocol of many secure multi-party computation problems. It has…
Expand
2007
2007
Secure Two-Party Point-Circle Inclusion Problem
Yonglong Luo
,
Liusheng Huang
,
Hong Zhong
Journal of Computational Science and Technology
2007
Corpus ID: 22683396
Privacy-preserving computational geometry is a special secure multi-party computation and has many applications. Previous…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE