-
1
-
-
10944273551
-
Don't store my data, japanese tell government
-
25 Aug.
-
D. Struck, "Don't Store My Data, Japanese Tell Government," Int'l Herald Tribune, 25 Aug. 2002, p. 1.
-
(2002)
Int'l Herald Tribune
, pp. 1
-
-
Struck, D.1
-
5
-
-
84958048324
-
Data swapping: Balancing privacy against precision in mining for logic rules
-
LNCS 1676, Springer-Verlag
-
V. Estivill-Castro and L. Brankovic, "Data Swapping: Balancing Privacy Against Precision in Mining for Logic Rules," Proc. 1st Conf. Data Warehousing and Knowledge Discovery (DaWaK-99), LNCS 1676, Springer-Verlag, 1999, pp. 389-398.
-
(1999)
Proc. 1st Conf. Data Warehousing and Knowledge Discovery (DaWaK-99)
, pp. 389-398
-
-
Estivill-Castro, V.1
Brankovic, L.2
-
8
-
-
0023545076
-
How to play any mental game: A completeness theorem for protocols with honest majority
-
ACM Press
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play any Mental Game: A Completeness Theorem for Protocols with Honest Majority," Proc. 19th ACM Symp. Theory of Computing, ACM Press, 1987, pp. 218-229; http://doi.acm.org/10.1145/28395.28420.
-
(1987)
Proc. 19th ACM Symp. Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
9
-
-
0342537489
-
Varieties of secure distributed computing
-
Springer-Verlag
-
M. Franklin and M. Yung, "Varieties of Secure Distributed Computing," Proc. Sequences II, Methods in Communications, Security and Computer Science, Springer-Verlag, 1991, pp. 392-417.
-
(1991)
Proc. Sequences II, Methods in Communications, Security and Computer Science
, pp. 392-417
-
-
Franklin, M.1
Yung, M.2
-
10
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioǧlu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge Data Eng., vol. 16, no. 9, 2004, pp. 1026-1037; http://csdl.computer.org/comp/trans/tk/2004/09/k1026abs.htm.
-
(2004)
IEEE Trans. Knowledge Data Eng.
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
11
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
to be published
-
J. Vaidya and C. Clifton, "Secure Set Intersection Cardinality with Application to Association Rule Mining," to be published in J. Computer Security, 2005.
-
(2005)
J. Computer Security
-
-
Vaidya, J.1
Clifton, C.2
-
12
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," J. Cryptology, vol. 15, no. 3, 2002, pp. 177-206; http://www.cs.biu.ac.il/~lindell/abstracts/id3_abs.html.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
13
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton et al., "Tools for Privacy Preserving Distributed Data Mining," SICKDD Explorations, vol. 4, no. 2, 2003, pp. 28-34; www.acm.org/sigs/sigkdd/explorations/issue4-2/contents.htm.
-
(2003)
SICKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
-
14
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
N.R. Adam and J.C. Wortmann, "Security-Control Methods for Statistical Databases: A Comparative Study," ACM Computing Surveys, vol. 21, no. 4, 1989, pp. 515-556; http://doi.acm.org/10.1145/76894.76895.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Wortmann, J.C.2
-
15
-
-
0031362884
-
Protecting databases from inference attacks
-
T.H. Hinke, H.S. Delugach, and R.P. Wolf, "Protecting Databases from Inference Attacks," Computers and Security, vol. 16, no. 8, 1997, pp. 687-708.
-
(1997)
Computers and Security
, vol.16
, Issue.8
, pp. 687-708
-
-
Hinke, T.H.1
Delugach, H.S.2
Wolf, R.P.3
-
17
-
-
0021941417
-
The knowledge complexity of interactive proof systems
-
ACM Press
-
S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof Systems," Proc. 17th Ann. ACM Symp. Theory of Computing (STOC 85), ACM Press, 1985, pp. 291-304.
-
(1985)
Proc. 17th Ann. ACM Symp. Theory of Computing (STOC 85)
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
|