-
1
-
-
26444451487
-
On secure scalar product computation for privacy-preserving data mining
-
H. L. B. Goethals, S. Laur and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In 7th ICISC, 2004.
-
(2004)
7th ICISC
-
-
Goethals, H.L.B.1
Laur, S.2
Mielikainen, T.3
-
2
-
-
35048871887
-
Using secret sharing for searching in encrypted data
-
Springer-Verlag LNCS
-
R. Brinkman, J. M. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Proc. of Workshop on Secure Data Management in a Connected World (SDM 2004), Springer-Verlag LNCS 3178, pages 18-27, 2004.
-
(2004)
Proc. of Workshop on Secure Data Management in A Connected World (SDM 2004)
, vol.3178
, pp. 18-27
-
-
Brinkman, R.1
Doumen, J.M.2
Jonker, W.3
-
3
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
New York, NY, USA, ACM Press
-
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing, pages 11-19, New York, NY, USA, 1988. ACM Press.
-
(1988)
STOC '88: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
4
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography, pages 119-136, 2001.
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
5
-
-
84927517111
-
Privacy-preserving statistical analysis
-
New Orleans, Louisiana, USA, December 10-14
-
W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 102-110, New Orleans, Louisiana, USA, December 10-14 2001.
-
(2001)
Proceedings of the 17th Annual Computer Security Applications Conference
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
6
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
ACM
-
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218-229. ACM, 1987.
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
7
-
-
33745439412
-
A new privacy-preserving distributed k-clustering algorithm
-
Bethesda, Maryland, April 20-22
-
G. Jagannathan, K. Pillaipakkamnatt, and R. Wright. A new privacy-preserving distributed k-clustering algorithm. In 2006 SIAM International Conference on Data Mining (SDM, Bethesda, Maryland, April 20-22 2006.
-
(2006)
2006 SIAM International Conference on Data Mining SDM
-
-
Jagannathan, G.1
Pillaipakkamnatt, K.2
Wright, R.3
-
8
-
-
4744354027
-
On compressing encrypted data
-
October
-
M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, and K. Ramchandran. On compressing encrypted data. IEEE Trans. on Signal Processing, 52(10):2992-3006, October 2004.
-
(2004)
IEEE Trans. on Signal Processing
, vol.52
, Issue.10
, pp. 2992-3006
-
-
Johnson, M.1
Ishwar, P.2
Prabhakaran, V.3
Schonberg, D.4
Ramchandran, K.5
-
10
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer-Verlag
-
P. Pailler. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt'99, Lecture Notes is Computer Science vol. 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Proceedings of Eurocrypt'99, Lecture Notes Is Computer Science
, vol.1592
, pp. 223-238
-
-
Pailler, P.1
-
11
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
Brighton, UK, November 1
-
P. Ravikumar, W. Cohen, and S. Fienberg. A secure protocol for computing string distance metrics. In Workshop on Privacy and Security Aspects of Data Mining, Brighton, UK, November 1 2004.
-
(2004)
Workshop on Privacy and Security Aspects of Data Mining
-
-
Ravikumar, P.1
Cohen, W.2
Fienberg, S.3
-
13
-
-
0034820931
-
Privacy-preserving cooperative scientific computations
-
Nova Scotia, Canada, June 11-13
-
W.Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundations Workshop, pages 273-282, Nova Scotia, Canada, June 11-13 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 273-282
-
-
Du, W.1
Atallah, M.J.2
-
14
-
-
12244255356
-
Privacy-preserving bayesian network structure computation on distributed heterogeneous data
-
New York, NY, USA, ACM Press
-
R. Wright and Z. Yang. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD '04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 713-718, New York, NY, USA, 2004. ACM Press.
-
(2004)
KDD '04: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
|