메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 236-252

Privacy-preserving graph algorithms in the semi-honest model

Author keywords

Graph Algorithms; Privacy; Secure Multiparty Computation

Indexed keywords

ALGORITHMS; COMPUTATION THEORY; DATA MINING; DATA PRIVACY; INFORMATION ANALYSIS; MATHEMATICAL MODELS;

EID: 33646793331     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_13     Document Type: Conference Paper
Times cited : (133)

References (39)
  • 1
    • 35048875418 scopus 로고    scopus 로고
    • Secure computation of the k-th ranked element
    • Proc. Advances in Cryptology - EUROCRYPT 2004. Springer-Verlag
    • G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k-th ranked element. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 40-55. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 40-55
    • Aggarwal, G.1    Mishra, N.2    Pinkas, B.3
  • 6
    • 85029542707 scopus 로고
    • Foundations of secure interactive computing
    • Proc. Advances in Cryptology - CRYPTO 1991. Springer-Verlag
    • D. Beaver. Foundations of secure interactive computing. In Proc. Advances in Cryptology - CRYPTO 1991, volume 576 of LNCS, pages 377-391. Springer-Verlag, 1992.
    • (1992) LNCS , vol.576 , pp. 377-391
    • Beaver, D.1
  • 7
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptograpic protocols
    • R. Canetti. Security and composition of multiparty cryptograpic protocols. J. Cryptology, 13(1):143-202, 2000.
    • (2000) J. Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 24144487020 scopus 로고    scopus 로고
    • Towards privacy in public databases
    • Proc. 2nd Theory of Cryptography Conference (TCC). Springer-Verlag
    • S. Chawla, C. Dwork, F. McSherry, A. Smith, and H. Wee. Towards privacy in public databases. In Proc. 2nd Theory of Cryptography Conference (TCC), volume 3378 of LNCS, pages 363-385. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3378 , pp. 363-385
    • Chawla, S.1    Dwork, C.2    McSherry, F.3    Smith, A.4    Wee, H.5
  • 15
    • 2942529194 scopus 로고    scopus 로고
    • Privacy-preserving multivariate statistical analysis: Linear regression and classification
    • SIAM
    • W. Du, Y. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: linear regression and classification. In Proc. 4th SIAM International Conference on Data Mining (SDM), pages 222-233. SIAM, 2004.
    • (2004) Proc. 4th SIAM International Conference on Data Mining (SDM) , pp. 222-233
    • Du, W.1    Han, Y.2    Chen, S.3
  • 16
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-preserving data mining on vertically partitioned databases
    • Proc. Advances in Cryptology - CRYPTO 2004. Springer-Verlag
    • C. Dwork and K. Nissim. Privacy-preserving data mining on vertically partitioned databases. In Proc. Advances in Cryptology - CRYPTO 2004, volume 3152 of LNCS, pages 528-544. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 18
    • 84879521412 scopus 로고    scopus 로고
    • Secure multiparty computation of approximations
    • Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP). Springer-Verlag
    • J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. Strauss, and R. Wright. Secure multiparty computation of approximations. In Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP), volume 2076 of LNCS, pages 927-938. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2076 , pp. 927-938
    • Feigenbaum, J.1    Ishai, Y.2    Malkin, T.3    Nissim, K.4    Strauss, M.5    Wright, R.6
  • 20
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Proc. Advances in Cryptology - EUROCRYPT 2004. Springer-Verlag
    • M. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Proc. Advances in Cryptology - EUROCRYPT 2004, volume 3027 of LNCS, pages 1-19. Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 28
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptology, 15(3):177-206, 2002.
    • (2002) J. Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 32
    • 22044454088 scopus 로고    scopus 로고
    • Computationally secure oblivious transfer
    • M. Naor and B. Pinkas. Computationally secure oblivious transfer. J. Cryptology, 18(1):1-35, 2005.
    • (2005) J. Cryptology , vol.18 , Issue.1 , pp. 1-35
    • Naor, M.1    Pinkas, B.2
  • 34
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • IEEE
    • H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In Proc. 3rd IEEE International Conference on Data Mining (ICDM), pages 625-628. IEEE, 2003.
    • (2003) Proc. 3rd IEEE International Conference on Data Mining (ICDM) , pp. 625-628
    • Polat, H.1    Du, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.