M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, Private collaborative forecasting and benchmarking, Proceedings of the 2004 ACM workshop on Privacy in the electronic society , WPES '04, pp.103-114, 2004.
DOI : 10.1145/1029179.1029204

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, On secure scalar product computation for privacy-preserving data mining, The 7th Annual International Conference in Information Security and Cryptology, pp.104-120, 2002.
DOI : 10.1007/11496618_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

O. Goldreich, The Foundations of Cryptography, Cryptographic Protocols, 2004.

O. Goldreich, The Foundations of Cryptography, 2004.

S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, Proceedings of the 17th Annual ACM Symposium on Theory of Computing, pp.291-304, 1985.

W. Jiang, M. Murugesan, C. Clifton, and L. Si, Similar Document Detection with Limited Information Disclosure, 2008 IEEE 24th International Conference on Data Engineering, 2008.
DOI : 10.1109/ICDE.2008.4497482

U. Manber, Finding similar files in a large file system, 1993.

M. Murugesan, W. Jiang, C. Clifton, L. Si, and J. Vaidya, Efficient privacypreserving similar document detection, The VLDB Journal, 2010.
DOI : 10.1007/s00778-009-0175-9

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology -Eurocrypt '99 Proceedings, LNCS 1592, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

S. Schleimer, D. S. Wilkerson, and A. Aiken, Winnowing, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.76-85, 2003.
DOI : 10.1145/872757.872770