메뉴 건너뛰기




Volumn , Issue , 2006, Pages 69-78

Data collection with self-enforcing privacy

Author keywords

Data collection; Privacy

Indexed keywords

DATA COLLECTION; LEAKY POLLSTER; SELF-ENFORCING PRIVACY;

EID: 34547248624     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180416     Document Type: Conference Paper
Times cited : (26)

References (24)
  • 2
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking relational data: Framework, algorithms and analysis
    • Rakesh Agrawal, Peter J. Haas, and Jerry Kiernan. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2):157-169, 2003.
    • (2003) The VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 3
    • 35048857810 scopus 로고    scopus 로고
    • Cryptographic randomized response techniques
    • Public Key Cryptography, PKC 2004, of
    • Andris Ambainis, Markus Jakobsson, and Helger Lipmaa. Cryptographic randomized response techniques. In Public Key Cryptography - PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 425-438, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2947 , pp. 425-438
    • Ambainis, A.1    Jakobsson, M.2    Lipmaa, H.3
  • 4
    • 34547376466 scopus 로고    scopus 로고
    • Theft-protected proprietary certificates
    • Digital Rights Management Workshop, DRM 2002, of
    • Alexandra Boldyreva and Markus Jakobsson. Theft-protected proprietary certificates. In Digital Rights Management Workshop - DRM 2002, volume 2696 of Lecture Notes in Computer Science, pages 208-220, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2696 , pp. 208-220
    • Boldyreva, A.1    Jakobsson, M.2
  • 5
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Dan Boneh and James Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5):1897-1905, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 8
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Advances in Cryptology-CRYPTO '92, of
    • David Chaum and Torben P. Pedersen. Wallet databases with observers. In Advances in Cryptology-CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105, 1993.
    • (1993) Lecture Notes in Computer Science , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 9
    • 24644493543 scopus 로고    scopus 로고
    • Proof systems for general statements about discrete logarithms
    • Technical Report 260, Dept. of Computer Science, ETH Zurich, March
    • Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report 260, Dept. of Computer Science, ETH Zurich, March 1997.
    • (1997)
    • Camenisch, J.1    Stadler, M.2
  • 11
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • TCC 2006, of
    • Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006, volume 3876 of Lecture Notes in Computer Science, pages 265-284, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3876 , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 12
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy. Invited talk
    • ICALP 2006, of
    • Cynthia Dwork. Differential privacy. Invited talk. In ICALP 2006, Part II, volume 4052 of Lecture Notes in Computer Science, pages 1-12, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4052 , Issue.PART II , pp. 1-12
    • Dwork, C.1
  • 14
    • 35248822599 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • Public Key Cryptography, PKC 2008, of
    • Jens Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography - PKC 2008, volume 2567 of Lecture Notes in Computer Science, pages 145-160, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2567 , pp. 145-160
    • Groth, J.1
  • 15
    • 34547355866 scopus 로고    scopus 로고
    • Proprietary certificates
    • Topics in Cryptology, CT-RSA 2002, of
    • Markus Jakobsson, Ari Juels, and Phong Q. Nguyen. Proprietary certificates. In Topics in Cryptology - CT-RSA 2002, volume 2271 of Lecture Notes in Computer Science, pages 164-181. 2002.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 164-181
    • Jakobsson, M.1    Juels, A.2    Nguyen, P.Q.3
  • 16
    • 33244455692 scopus 로고    scopus 로고
    • Simulatable auditing
    • ACM
    • Krishnaram Kenthapadi, Nina Mishra, and Kobbi Nissim. Simulatable auditing. In PODS 2005, pages 118-127. ACM, 2005.
    • (2005) PODS 2005 , pp. 118-127
    • Kenthapadi, K.1    Mishra, N.2    Nissim, K.3
  • 20
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • John M. Pollard. Monte Carlo methods for index computation (mod p). Mathematics of Computation, 32:918-924, 1978.
    • (1978) Mathematics of Computation , vol.32 , pp. 918-924
    • Pollard, J.M.1
  • 21
    • 84947921515 scopus 로고    scopus 로고
    • Asymmetric fingerprinting (extended abstract)
    • Advances in Cryptology, EUROCRYPT '96, of
    • Birgit Pfitzmann and Matthias Schunter. Asymmetric fingerprinting (extended abstract). In Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 84-95, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1070 , pp. 84-95
    • Pfitzmann, B.1    Schunter, M.2
  • 22
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Claus-Peter Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 23
    • 0013776710 scopus 로고
    • Randomized response: A survey technique for eliminating evasive answer bias
    • March
    • Stanley L. Warner. Randomized response: A survey technique for eliminating evasive answer bias. The American Statistical Association, 60(309):63-69, March 1965.
    • (1965) The American Statistical Association , vol.60 , Issue.309 , pp. 63-69
    • Warner, S.L.1
  • 24
    • 0020312165 scopus 로고
    • Protocols for secure computations (extended abstract)
    • Chicago, Illinois, 3-5 November, IEEE
    • Andrew Chi-Chih Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science, pages 160-164, Chicago, Illinois, 3-5 November 1982. IEEE.
    • (1982) 23rd Annual Symposium on Foundations of Computer Science , pp. 160-164
    • Chi-Chih Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.