Efficient Cryptographic Primitives for Private Data MiningJan 1, 2010ยทMark Shaneck,Yongdae Kimยท 0 min read DOILast updated on Jan 1, 2010 AuthorsMark ShaneckAuthorsYongdae Kim← Designs to account for trust in social network-based sybil defenses Jan 1, 2010Losing control of the internet: using the data plane to attack the control plane Jan 1, 2010 →