-
2
-
-
1142303699
-
Information sharing across private databases
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing across Private Databases," Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data, pp. 86-97, 2003.
-
(2003)
Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti, "Security and Composition of Multiparty Cryptographic Protocols," J. Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
R. Canetti, Y. Ishai, R. Kumar, M. Reiter, R. Rubinfeld, and R.N. Wright, "Selective Private Function Evaluation with Applications to Private Statistics," Proc. 20th Ann. ACM Symp. Principles of Distributed Computing, pp. 293-304, 2001.
-
(2001)
Proc. 20th Ann. ACM Symp. Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.N.6
-
8
-
-
33744931597
-
Learning bayesian network structure from distributed data
-
R. Chen, K. Sivakumar, and H. Kargupta, "Learning Bayesian Network Structure from Distributed Data," Proc. SIAM Int'l Data Mining Conf., pp. 284-288, 2003.
-
(2003)
Proc. SIAM Int'l Data Mining Conf.
, pp. 284-288
-
-
Chen, R.1
Sivakumar, K.2
Kargupta, H.3
-
9
-
-
85132067551
-
Collective mining of bayesian networks from distributed heterogeneous data
-
R. Chen, K. Sivakumar, and H. Kargupta, "Collective Mining of Bayesian Networks from Distributed Heterogeneous Data," Knowledge Information Syststems, vol. 6, no. 2, pp. 164-187, 2004.
-
(2004)
Knowledge Information Syststems
, vol.6
, Issue.2
, pp. 164-187
-
-
Chen, R.1
Sivakumar, K.2
Kargupta, H.3
-
11
-
-
34249832377
-
A bayesian method for the induction of probabilistic networks from data
-
G. Cooper and E. Herskovits, "A Bayesian Method for the Induction of Probabilistic Networks from Data," Machine Learning, vol. 9, no. 4, pp. 309-347, 1992.
-
(1992)
Machine Learning
, vol.9
, Issue.4
, pp. 309-347
-
-
Cooper, G.1
Herskovits, E.2
-
14
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy Preserving Mining of Association Rules," Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 217-228, 2002.
-
(2002)
Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
15
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer-Verlag
-
M. Freedman, K. Nissim, and B. Pinkas, "Efficient Private Matching and Set Intersection," Advances in Cryptology - Proc. EUROCRYPT 2004, pp. 1-19, Springer-Verlag, 2004.
-
(2004)
Advances in Cryptology - Proc. EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
16
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On Private Scalar Product Computation for Privacy-Preserving Data Mining," Information Security and Cryptology - Proc. ICISC, vol. 3506, pp. 104-120, 2004.
-
(2004)
Information Security and Cryptology - Proc. ICISC
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
17
-
-
0023545076
-
How to play ANY mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play ANY Mental Game," Proc. 19th Ann. ACM Conf. Theory of Computing, pp. 218-229, 1987.
-
(1987)
Proc. 19th Ann. ACM Conf. Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
19
-
-
84858938641
-
-
The Health Insurance Portability and Accountability Act of 1996, http://www.cms.hhs.gov/hipaa, 1996.
-
-
-
-
22
-
-
84949523513
-
Collective, hierarchical clustering from distributed, heterogeneous data
-
E. Johnson and H. Kargupta, "Collective, Hierarchical Clustering from Distributed, Heterogeneous Data," Lecture Notes in Computer Science, vol. 1759, pp. 221-244, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1759
, pp. 221-244
-
-
Johnson, E.1
Kargupta, H.2
-
26
-
-
33746890438
-
Implementing privacy-preserving bayesian-net discovery for vertically partitioned data
-
O. Kardes, R.S. Ryger, R.N. Wright, and J. Feigenbaum, "Implementing Privacy-Preserving Bayesian-Net Discovery for Vertically Partitioned Data," Proc. Int'l Conf. Data Mining Workshop Privacy and Security Aspects of Data Mining, 2005.
-
(2005)
Proc. Int'l Conf. Data Mining Workshop Privacy and Security Aspects of Data Mining
-
-
Kardes, O.1
Ryger, R.S.2
Wright, R.N.3
Feigenbaum, J.4
-
27
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the Privacy Preserving Properties of Random Data Perturbation Techniques," Proc. Third IEEE Int'l Conf. Data Mining, pp. 99-106, 2003.
-
(2003)
Proc. Third IEEE Int'l Conf. Data Mining
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
28
-
-
0001282382
-
Collective data mining: A new perspective towards distributed data mining
-
AAAI/MIT Press
-
H. Kargupta, B. Park, D. Hershberger, and E. Johnson, "Collective Data Mining: A New Perspective towards Distributed Data Mining," Advances in Distributed and Parallel Knowledge Discovery, AAAI/MIT Press, 2000.
-
(2000)
Advances in Distributed and Parallel Knowledge Discovery
-
-
Kargupta, H.1
Park, B.2
Hershberger, D.3
Johnson, E.4
-
29
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," J. Cryptology, vol. 15, no. 3, pp. 177-206, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
30
-
-
19544378656
-
Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data
-
Computer Science and Electrical Eng. Dept., Univ. of Maryland, Baltimore County
-
K. Liu, H. Kargupta, and J. Ryan, "Multiplicative Noise, Random Projection, and Privacy Preserving Data Mining from Distributed Multi-Party Data," Technical Report TR-CS-03-24, Computer Science and Electrical Eng. Dept., Univ. of Maryland, Baltimore County, 2003.
-
(2003)
Technical Report
, vol.TR-CS-03-24
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
31
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay - A Secure Two-Party Computation System," Proc. 13th Usenix Security Symp., pp. 287-302, 2004.
-
(2004)
Proc. 13th Usenix Security Symp.
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
32
-
-
19544375935
-
Privacy-sensitive bayesian network parameter learning
-
D. Meng, K. Sivakumar, and H. Kargupta, "Privacy-Sensitive Bayesian Network Parameter Learning," Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 487-490, 2004.
-
(2004)
Proc. Fourth IEEE Int'l Conf. Data Mining
, pp. 487-490
-
-
Meng, D.1
Sivakumar, K.2
Kargupta, H.3
-
33
-
-
1542412446
-
Some privacy issues in knowledge discovery: The OECD personal privacy guidelines
-
D.E. O'Leary, "Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines," IEEE Expert, vol. 10, no. 2, pp. 48-52, 1995.
-
(1995)
IEEE Expert
, vol.10
, Issue.2
, pp. 48-52
-
-
O'Leary, D.E.1
-
34
-
-
84942550998
-
Public-key cryptosystems based on composite degree residue classes
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residue Classes," Advances in Cryptography - Proc. EUROCRYPT '99, pp. 223-238, 1999.
-
(1999)
Advances in Cryptography - Proc. EUROCRYPT '99
, pp. 223-238
-
-
Paillier, P.1
-
35
-
-
0003187764
-
Directive 95/46/EC of the European Parliament and of the council of 24 october 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
European Parliament, "Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data," Official J. European Communities, p. 31 1995.
-
(1995)
Official J. European Communities
, pp. 31
-
-
-
36
-
-
32344440396
-
Directive 97/66/EC of the European Parliament and of the council of 15 december 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector
-
European Parliament, "Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 Concerning the Processing of Personal Data and the Protection of Privacy in the Telecommunications Sector," Official J. European Communities, pp. 1-8, 1998.
-
(1998)
Official J. European Communities
, pp. 1-8
-
-
-
38
-
-
85172423269
-
JAM: Java Agents for Meta-learning over distributed databases
-
S. Stolfo, A. Prodromidis, S. Tselepis, W. Lee, D. Fan, and P. Chan, "JAM: Java Agents for Meta-Learning over Distributed Databases," Knowledge Discovery and Data Mining, pp. 74-81, 1997.
-
(1997)
Knowledge Discovery and Data Mining
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.2
Tselepis, S.3
Lee, W.4
Fan, D.5
Chan, P.6
-
39
-
-
35048857952
-
Experimental analysis of privacy-preserving statistics computation
-
Aug.
-
H. Subramaniam, R.N. Wright, and Z. Yang, "Experimental Analysis of Privacy-Preserving Statistics Computation," Proc. Very Large Data Bases Worshop Secure Data Management, pp. 55-66, Aug. 2004.
-
(2004)
Proc. Very Large Data Bases Worshop Secure Data Management
, pp. 55-66
-
-
Subramaniam, H.1
Wright, R.N.2
Yang, Z.3
-
44
-
-
0345777519
-
Distributed cooperative bayesian learning strategies
-
K. Yamanishi, "Distributed Cooperative Bayesian Learning Strategies," Information and Computation, vol. 150, no. 1, pp. 22-56, 1999.
-
(1999)
Information and Computation
, vol.150
, Issue.1
, pp. 22-56
-
-
Yamanishi, K.1
|