The SCEAS System
Navigation Menu

Search the dblp DataBase


Yitao Duan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yitao Duan, John F. Canny
    How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:244-261 [Conf]
  2. Yitao Duan, John F. Canny
    From Commodity to Value: A Privacy-Preserving e-Business Architecture. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2006, pp:488-495 [Conf]
  3. Ben Y. Zhao, Yitao Duan, Ling Huang, Anthony D. Joseph, John Kubiatowicz
    Brocade: Landmark Routing on Overlay Networks. [Citation Graph (0, 0)][DBLP]
    IPTPS, 2002, pp:34-44 [Conf]
  4. Yitao Duan, John F. Canny
    Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:167-185 [Conf]
  5. Yitao Duan, John F. Canny
    Scalable Secure Bidirectional Group Communication. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:875-883 [Conf]
  6. Yitao Duan, John F. Canny
    Practical private computation of vector addition-based functions. [Citation Graph (0, 0)][DBLP]
    PODC, 2007, pp:326-327 [Conf]
  7. Yitao Duan, John F. Canny, Justin Zhan
    Efficient Privacy-Preserving Association Rule Mining: P4P Style. [Citation Graph (0, 0)][DBLP]
    CIDM, 2007, pp:654-660 [Conf]

  8. Privacy without noise. [Citation Graph (, )][DBLP]

  9. Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002