{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T23:58:08Z","timestamp":1649116688272},"reference-count":24,"publisher":"International Academy Publishing (IAP)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.7.9.2224-2231","type":"journal-article","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T23:40:37Z","timestamp":1348702837000},"source":"Crossref","is-referenced-by-count":1,"title":["Privacy-preserving Judgment of the Intersection for Convex Polygons"],"prefix":"10.17706","volume":"7","author":[{"given":"Yifei","family":"Yao","sequence":"first","affiliation":[]},{"given":"Shurong","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Miaomiao","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2012,9,1]]},"reference":[{"key":"ref0","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77974-2"},{"key":"ref1","first-page":"127","article-title":"A Practical Approach to Solve Secure Multi-party Computation Problems","volume-title":"New Security Paradigms Workshop","author":"Du","year":"2002","unstructured":"[5] W. Du, and Z. Zhan, A Practical Approach to Solve Secure Multi-party Computation Problems, New Security Paradigms Workshop. Beach Virginia, USA, pp. 127\u2013135, September 2002."},{"key":"ref2","first-page":"160","article-title":"Protocol for Secure Computations (extended abstract","volume-title":"21st Annual IEEE Symposium on the Foundations of Computer Science","author":"Yao","year":"1982","unstructured":"[6] A. C. Yao, Protocol for Secure Computations (extended abstract), 21st Annual IEEE Symposium on the Foundations of Computer Science. IEEE Press, New York, USA, pp. 160\u2013164, 1982."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/1971690.1971696","article-title":"Privacy-preserving Cooperative Scientific Computation","volume-title":"14th IEEE Computer Security Foundations Workshop","author":"Du","year":"2001","unstructured":"[9] W. Du, and J. A. Mikhail, Privacy-preserving Cooperative Scientific Computation, 14th IEEE Computer Security Foundations Workshop. Nova Scotia, Canada, pp. 273\u2013282, 2001."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17955-6_25"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1869790.1869796"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1971690.1971696"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16515-3_27"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2009.97"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ETCS.2009.626"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1002\/bltj.20499","article-title":"A Secure Protocol for Determining the Meeting Points of Two Intersected Circles","volume-title":"International Conference on Information Technology and Computer Science","volume":"2","author":"Ye","year":"2009","unstructured":"[20] Y. Ye, L. Huang, W. Yang, and Z. Zhou, A Secure Protocol for Determining the Meeting Points of Two Intersected Circles, International Conference on Information Technology and Computer Science. Kiev, Ukraine, vol. 2, pp. 40\u201344, July 2009."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20499"},{"issue":"2","key":"ref7","first-page":"205","article-title":"An Efficient Protocol for Private Comparison Problem","volume":"18","author":"Luo","year":"2009","unstructured":"[23] Y. Luo, L. Huang, W. Yang, and W. Xu, An Efficient Protocol for Private Comparison Problem, Chinese Journal of Electronics. Beijing. China, vol. 18(2), pp. 205\u2013209, April 2009.","journal-title":"Chinese Journal of Electronics Beijing China"},{"key":"ref7","unstructured":"[1] V. A. Oleshchuk, V. Zadorozhny, Secure Multi-party Computations and Privacy Preservation: Results and Open Problems, Telektronikk. Norway, pp. 20\u201326, February 2007."},{"key":"ref7","unstructured":"[2] Goldreich, Secure Multi-party Computation (working draft). Available from www.wisdom.weizmann.ac.il\/home\/oded\/publichtml\/foc.html, 1998."},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[4] S. Li, and Y. Dai, Secure Two-Party Computational Geometry, Journal of Computer Science and Technology. Beijing, China, vol. 20(2), pp. 259\u2013263, 2005.","DOI":"10.1007\/s11390-005-0258-z"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[7] C. Clifton, M. Kantarcioglou, Xiadong. Lin, and M. Y. Zhu, Tools for Privacy Preserving Distributed Data Mining, SIGKDD Explorations Newsletter. New York, USA, vol. 4, Issue 2, December 2002.","DOI":"10.1145\/772862.772867"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[8] Y. Yao, L. Huang, W. Yang, Y. Luo, W. Jing, and W. Xu, \"Privacy-preserving Technology and Its Applications in Statistics Measurements,\" The Second International Conference on Scalable Information Systems. Suzhou. China, article 74, June 2007.","DOI":"10.4108\/infoscale.2007.211"},{"key":"ref7","unstructured":"[10] Y. Yao, L. Huang, and Y. Luo, Privacy-preserving matrix rank computation and its applications, Chinese Journal of Electronics. Beijing, China,, vol. 17(3), pp. 481\u2013486, 2008."},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[15] M. Hardt, and K. Talwar, On the geometry of differential privacy, STOC '10 Proceedings of the 42nd ACM symposium on Theory of computing. New York, USA, pp. 705\u2013714, 2010.","DOI":"10.1145\/1806689.1806786"},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"[17] L. Yehuda, and P. Benny, An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries, 26th annual international conference on Advances in Cryptology. Barcelona, Spain, pp. 52\u201378, 2007.","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"ref7","unstructured":"[22] A. Gupta, M. Saini, and A. Mathuria, Security analysis of the Louis protocol for location privacy, Communication Systems and Networks and Workshops. Bangalore. India, pp. 1\u20138, January 2009. doi: 10.1109\/2009.4808858."},{"key":"ref7","unstructured":"[24] J. Qin, Z. Zhang, D. Feng, and B. Li, A Protocol of Comparing Information without Leaking, Journal of Software. Beijing, China, vol. 15(3), pp. 421\u2013427, 2004."}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2019,7,4]],"date-time":"2019-07-04T07:12:53Z","timestamp":1562224373000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/8300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,1]]},"references-count":24,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2012,9,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.7.9.2224-2231","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2012,9,1]]}}}