-
1
-
-
1142303699
-
Information sharing across private databases
-
San Diego, California, June 9-12
-
R. Agrawal, A. Evfimievski, and R. Srikant. Information sharing across private databases, In Proceedings of ACM SIGMOD International Conference on Management of Data, San Diego, California, June 9-12 2003.
-
(2003)
Proceedings of ACM SIGMOD International Conference on Management of Data
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
0242697120
-
Secure multi-party computational geometry
-
Providence, Rhode Island, USA, Aug. 8-10. [Online]
-
M. J. Atallah and W. Du. Secure multi-party computational geometry. In Seventh International Workshop on Algorithms and Data Structures (WADS 2001), Providence, Rhode Island, USA, Aug. 8-10 2001. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/wads2001.ps
-
(2001)
Seventh International Workshop on Algorithms and Data Structures (WADS 2001)
-
-
Atallah, M.J.1
Du, W.2
-
5
-
-
0242612156
-
A practical approach to solve secure multi-party computation problems
-
Virginia Beach, virginia, Usa, September 23-26
-
W. Du and Z. Zhan. A practical approach to solve secure multi-party computation problems. In Proceedings of New Security Paradigms Workshop, Virginia Beach, virginia, USA, September 23-26 2002.
-
(2002)
Proceedings of New Security Paradigms Workshop
-
-
Du, W.1
Zhan, Z.2
-
6
-
-
0034820931
-
Privacy-preserving cooperative scientific computations
-
Nova Scotia, Canada, June 11-13. [Online]
-
W. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 11-13 2001, pages 273-282. [Online]. Available: http://portal.acm.org
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 273-282
-
-
Du, W.1
Atallah, M.J.2
-
7
-
-
84927517111
-
Privacy-preserving statistical analysis
-
New Orleans, Louisiana, USA, December 10-14. [Online]
-
W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceeding of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, December 10-14 2001. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/acsac2001.ps
-
(2001)
Proceeding of the 17th Annual Computer Security Applications Conference
-
-
Du, W.1
Atallah, M.J.2
-
8
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Cloudcroft, New Mexico, USA, September 11-13. [Online]
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, Cloudcroft, New Mexico, USA, September 11-13 2001, pages 11-20. [Online]. Available: http://www.cerias.purdue.edu/homes/duw/research/paper/nspw2001.ps
-
(2001)
New Security Paradigms Workshop
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
9
-
-
1642302606
-
Building decision tree classifier on private data
-
C. Clifton and V. Estivill-Castro, Eds. Maebashi City, Japan: Australian Computer Society, Dec. 9. [Online]
-
W. Du and Z. Zhan. Building decision tree classifier on private data. In IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pages 1-8. [Online]. Available: http://www.jrpit.flinders.edu.au/CRPITVolume14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
10
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
[Online]
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game - a completeness theorem for protocols with honest majority. In 19th ACM Symposium on the Theory of Computing, 1987, pages 218-229. [Online]. Available: http://doi.acm.org/10.1145/28395.28420
-
(1987)
19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0003839182
-
-
Sept., working draft. [Online]
-
O. Goldreich. Secure multi-party computation. Sept. 1998, (working draft). [Online]. Available: http://www.wisdom.weizmann.ac.il/~oded/pp.html
-
(1998)
Secure Multi-party Computation
-
-
Goldreich, O.1
-
12
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
Vancouver, British Columbia, Aug. 18-21
-
I. Ioannidis, A. Grama, and M. Atallah. A secure protocol for computing dot-products in clustered and distributed environments. In The 2002 International Conference on Parallel Processing, Vancouver, British Columbia, Aug. 18-21 2002.
-
(2002)
The 2002 International Conference on Parallel Processing
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
13
-
-
1642335029
-
An architecture for privacy-preserving mining of client information
-
C. Clifton and V. Estivill-Castro, Eds. Maebashi City, Japan: Australian Computer Society, Dec. 9. [Online]
-
M. Kantarcioglu and J. Vaidya. An architecture for privacy-preserving mining of client information. In IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, C. Clifton and V. Estivill-Castro, Eds., vol. 14. Maebashi City, Japan: Australian Computer Society, Dec. 9 2002, pages 37-42. [Online]. Available: http://crpit.com/Vol14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 37-42
-
-
Kantarcioglu, M.1
Vaidya, J.2
-
14
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
to appear
-
M. Kantarcioǧlu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge Data Eng., to appear.
-
IEEE Trans. Knowledge Data Eng.
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
15
-
-
84974555530
-
Privacy preserving data mining
-
Springer-Verlag, Aug. 20-24. [Online]
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000. Springer-Verlag, Aug. 20-24 2000, pages 36-54. [Online]. Available: http://link.springer.de/link/service/series/0558/bibs/1880/18800036.htm
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
16
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
Heraklion, Crete, Greece, July 6-8. [Online]
-
M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In Proceedings of the 33rd Annual ACM Symposium on Theory of Computing, Heraklion, Crete, Greece, July 6-8 2001. [Online]. Available: http://doi.acm.org/10.1145/380752.380855
-
(2001)
Proceedings of the 33rd Annual ACM Symposium on Theory of Computing
-
-
Naor, M.1
Nissim, K.2
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
[Online]
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978. [Online]. Available: http://doi.acm.org/10.1145/359340.359342
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada, July 23-26. [Online].
-
J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26 2002, pages 639-644. [Online]. Available: http://doi.acm.org/10.1145/775047.775142
-
(2002)
The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
|