-
1
-
-
34447251486
-
-
D. Struck, Don't store my data, Japanese tell government, in: International Herald Tribune, 25 Aug. 2002.
-
-
-
-
2
-
-
10944270172
-
Privacy-preserving data mining: why, how and when
-
Vaidya J., and Clifton C. Privacy-preserving data mining: why, how and when. IEEE Security and Privacy 2 6 (2004) 19-27
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 19-27
-
-
Vaidya, J.1
Clifton, C.2
-
4
-
-
0036811662
-
K-anonymity: a model for protecting privacy, International Journal on Uncertainty
-
Sweeney L. K-anonymity: a model for protecting privacy, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10 5 (2002) 557-570
-
(2002)
Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
5
-
-
0041783510
-
-
R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2000, pp. 439-450.
-
-
-
-
6
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
8
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Kantarcioglu M., and Clifton C. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowledge and Data Engineering 16 9 (2004) 1026-1037
-
(2004)
IEEE Trans. Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
10
-
-
2142754478
-
Association rule hiding
-
Verykios V.S., Elmagarmid A.K., Bertino E., Saygin Y., and Dasseni E. Association rule hiding. IEEE Trans. on Knowledge and Data Engineering 16 4 (2004) 434-447
-
(2004)
IEEE Trans. on Knowledge and Data Engineering
, vol.16
, Issue.4
, pp. 434-447
-
-
Verykios, V.S.1
Elmagarmid, A.K.2
Bertino, E.3
Saygin, Y.4
Dasseni, E.5
-
12
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton C., Kantarcioglou M., Lin X., and Zhu M.Y. Tools for privacy preserving distributed data mining. SIGKDD Exploration 4 2 (2002) 1-7
-
(2002)
SIGKDD Exploration
, vol.4
, Issue.2
, pp. 1-7
-
-
Clifton, C.1
Kantarcioglou, M.2
Lin, X.3
Zhu, M.Y.4
-
14
-
-
34447293269
-
-
M. Kantarcioglu, J. Vaidya, Privacy-preserving naive Bayes classifier for horizontally partitioned data, in: Proc. IEEE Workshop on Privacy Preserving Data Mining, 2003, pp. 3-9.
-
-
-
-
15
-
-
2942536415
-
-
J. Vaidya, C. Clifton, Privacy preserving naive Bayes classifier on vertically partitioned data, in: Proc. 2004 SIAM International Conference on Data Mining, 2004.
-
-
-
-
16
-
-
12244255356
-
-
R. Wright, Z. Yang, Privacy-preserving Baysian network structure computation on distributed heterogeneous data, in: Proc. KDD'04, 2004, pp. 713-718.
-
-
-
-
17
-
-
84880121624
-
-
Z. Yang, S. Zhong, R. Wright, Privacy-preserving classification of customer data without loss of accuracy, in: 5th SIAM International Conference on Data Mining, 2005.
-
-
-
-
18
-
-
78149340011
-
-
H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques, in: Proc. 3rd Int'l Conf. on Data Mining, 2003, 99-106.
-
-
-
-
19
-
-
0022882770
-
-
A.C. Yao, How to generate and exchange secrets, in: Proc. 27th IEEE Symposium on Foundations of Computer Science, 1986, pp. 162-167.
-
-
-
-
20
-
-
0023545076
-
-
O. Goldreich, S. Micali, A. Wigderson, How to play any mental game - a completeness theorem for protocols with honest majority, in: Proc. 19th ACM Symposium on the Theory of Computing, 1987, pp. 218-229.
-
-
-
-
21
-
-
84898947315
-
-
D. Chaum, C. Crepeau, I. Damgard, Multiparty unconditionally secure protocols, in: Proc. 20th ACM Symposium on the Theory of Computing, 1988, pp. 11-19.
-
-
-
-
22
-
-
0030387678
-
-
D.W.-L. Cheung, J. Han, V. Ng, A.W.-C. Fu, Y. Fu, A fast distributed algorithm for mining association rules, in: Proc. 1996 Int'l Conf. Parallel and Distributed Information Systems (PDIS'96), 1996, pp. 31-42.
-
-
-
-
23
-
-
34447293734
-
-
J.C. Benaloh, Secret sharing homomorphisms: Keeping shares of a secret, in: Proc. Crypto'86, 1986 pp. 251-260.
-
-
-
-
24
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
Chor B., and Kushilevitz E. A communication-privacy tradeoff for modular addition. Information Processing Letters 45 4 (1993) 205-210
-
(1993)
Information Processing Letters
, vol.45
, Issue.4
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
25
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory IT-31 (1985) 469-472
-
(1985)
IEEE Trans. Inform. Theory IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
26
-
-
34447273570
-
-
R. Agrawal, R. Srikant, Fast algorithms for mining association rules, in: Proc. 20th Int'l Conf. Very Large Data Bases, 1994, pp. 487-499.
-
-
-
-
28
-
-
84942550998
-
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: Proc. Eurocrypt'99, 1999, pp. 223-238.
-
-
-
-
30
-
-
34447272207
-
-
M.K. Franklin, M.K. Reiter, Fair exchange with a semi-trusted party, in: Proc. CCS'97, 1997.
-
-
-
-
31
-
-
21944438947
-
Identity-based fault-tolerant conference key agreement
-
Yi X. Identity-based fault-tolerant conference key agreement. IEEE Trans. Dependable and Secure Computing 1 3 (2004) 170-178
-
(2004)
IEEE Trans. Dependable and Secure Computing
, vol.1
, Issue.3
, pp. 170-178
-
-
Yi, X.1
-
32
-
-
34447270236
-
-
NBS FIPS PUB 46, Data Encryption Standard (National Bureau of Standards, US Department of ommerce, 1977).
-
-
-
-
33
-
-
34447250757
-
-
FIPS PUB 197, Advanced Encryption Standard (Federal Information Processing Standards Publications, US Department of Commerce/N.I.S.T., National Technical Information Service, 2001).
-
-
-
-
34
-
-
0036538428
-
A secure fault-tolerant conference key agreement protocol
-
Tzeng W.G. A secure fault-tolerant conference key agreement protocol. IEEE Trans. Computers 51 4 (2002) 373-379
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.4
, pp. 373-379
-
-
Tzeng, W.G.1
-
35
-
-
84919085619
-
An improved algorithm for computing logarithm over GF(p) and its cryptographic significance
-
Pohlig S.C., and Hellman M.E. An improved algorithm for computing logarithm over GF(p) and its cryptographic significance. IEEE Trans. Information Theory IT-24 (1978) 106-110
-
(1978)
IEEE Trans. Information Theory IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
37
-
-
34447291556
-
-
H. Lipmaa, AES candidates, A survey of implementation .
-
-
-
-
38
-
-
34447289975
-
-
M. Scott, Comparison of methods for modular exponentiation on 32-bit Intel 80x86 processors .
-
-
-
|