-
1
-
-
32344442645
-
A new scheme on privacy-preserving data classification
-
New York, NY, USA: ACM Press
-
N. Zhang, S. Wang, and W. Zhao, "A new scheme on privacy-preserving data classification," in KDD '05. New York, NY, USA: ACM Press, 2005, pp. 374-383.
-
(2005)
KDD '05
, pp. 374-383
-
-
Zhang, N.1
Wang, S.2
Zhao, W.3
-
2
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on. horizontally partitioned data
-
M. Kantarcioglu and C. Clifton, "Privacy-preserving distributed mining of association rules on. horizontally partitioned data," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 9, pp. 1026-1037, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
3
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining," Journal of cryptology, vol. 15, no. 3, pp. 177-206, 2002.
-
(2002)
Journal of cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
4
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
New York, NY, USA: ACM Press
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in KDD '02. New York, NY, USA: ACM Press, 2002, pp. 639-644.
-
(2002)
KDD '02
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
5
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
New York, NY, USA: ACM Press
-
J. Vaidya and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM Press, 2003, pp. 206-215.
-
(2003)
KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
6
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression, and classification
-
W. Du, Y Han, and S. Chen, "Privacy-preserving multivariate statistical analysis: Linear regression, and classification," in SIAM International Conference on Data Mining, 2004, pp. 222-233.
-
(2004)
SIAM International Conference on Data Mining
, pp. 222-233
-
-
Du, W.1
Han, Y.2
Chen, S.3
-
7
-
-
34548780105
-
-
J. Canny and Y Duan, Practical private computation of vector additionbased functions or: Can privacy be for free? Submitted to 2007 IEEE Symposium on Security and Privacy, 2006.
-
J. Canny and Y Duan, "Practical private computation of vector additionbased functions or: Can privacy be for free?" Submitted to 2007 IEEE Symposium on Security and Privacy, 2006.
-
-
-
-
8
-
-
34548755981
-
-
J. F. Canny and Y Duan, Practical private computation of vector addition-based functions or: Can privacy be for free? EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS- 2006-12.html
-
J. F. Canny and Y Duan, "Practical private computation of vector addition-based functions or: Can privacy be for free?" EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2006-12, February 8 2006. [Online]. Available: http://www.eecs.berkeley.edu/Pubs/TechRpts/2006/EECS- 2006-12.html
-
-
-
-
9
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Z. Yang, S. Zhong, and R. N. Wright, "Privacy-preserving classification of customer data without loss of accuracy," in SDM 2005, 2005.
-
(2005)
SDM 2005
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
10
-
-
0036082701
-
Collaborative filtering with privacy
-
Oakland, CA, May, Online, Available
-
J. Canny, "Collaborative filtering with privacy," in IEEE Symposium on Security and Privacy, Oakland, CA, May 2002, pp. 45-57. [Online]. Available: http://citeseer.nj.nec.com/canny02collaborative.html
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 45-57
-
-
Canny, J.1
-
11
-
-
8644267631
-
Gap: A factor model for discrete data
-
ACM Press
-
J. F. Canny, "Gap: a factor model for discrete data," in SIGIR '04. ACM Press, 2004, pp. 122-129.
-
(2004)
SIGIR '04
, pp. 122-129
-
-
Canny, J.F.1
-
12
-
-
33644750145
-
A secure online algorithm, for link analysis on weighted graph
-
April
-
Y. Duan, J. Wang, M. Kam, and J. Canny, "A secure online algorithm, for link analysis on weighted graph," in Proceedings of the Workshop on Link Analysis, Counterterrorism and Security at the SIAM Data Mining Conference, 2005, April 2005, pp. 71-81.
-
(2005)
Proceedings of the Workshop on Link Analysis, Counterterrorism and Security at the SIAM Data Mining Conference, 2005
, pp. 71-81
-
-
Duan, Y.1
Wang, J.2
Kam, M.3
Canny, J.4
-
13
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
ACM
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in STOC'88. ACM, 1988, pp. 1-10.
-
(1988)
STOC'88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
15
-
-
84955564077
-
Fair computation of general functions in presence of immoral majority
-
CRYPTO '90, Springer-Verlag
-
S. Goldwasser and L. Levin, "Fair computation of general functions in presence of immoral majority," in CRYPTO '90, ser. LNCS, vol. 537. Springer-Verlag, 1991, pp. 77-93.
-
(1991)
ser. LNCS
, vol.537
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
16
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
ACM Press
-
R. Gennaro, M. O. Rabin, and T. Rabin, "Simplified vss and fast-track multiparty computations with applications to threshold cryptography," in PODC '98. ACM Press, 1998, pp. 101-111.
-
(1998)
PODC '98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
18
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
P. Buneman and S. Jajodia, Eds, Washington D.C, May
-
R. Agrawal, T. Imielinski, and A. Swami, "Mining association rules between sets of items in large databases," in Proceedings of ACM SIGMOD Conference on Management of Data, P. Buneman and S. Jajodia, Eds., Washington D.C., May 1993, pp. 207-216.
-
(1993)
Proceedings of ACM SIGMOD Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
19
-
-
34548740622
-
Privacy preserving collaborative data mining,
-
Ph.D. dissertation, University of Ottawa
-
J. Zhan, "Privacy preserving collaborative data mining," Ph.D. dissertation, University of Ottawa, 2006.
-
(2006)
-
-
Zhan, J.1
-
20
-
-
0001882616
-
Fast algorithms for mining association rules
-
San Francisco, CA, USA: Morgan Kaufmann Publishers Inc
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in VLDB '94: Proceedings of the 20th International Conference on Very Large Data Bases. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 1994, pp. 487-499.
-
(1994)
VLDB '94: Proceedings of the 20th International Conference on Very Large Data Bases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
21
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
Advances in Cryptology, EUROCRYPT 2000, Springer-Verlag
-
F. Boudot, "Efficient proofs that a committed number lies in an interval," in Advances in Cryptology - EUROCRYPT 2000, ser. Lecture Notes in Computer Science, vol. 1807. Springer-Verlag, 2000, pp. 431-444.
-
(2000)
ser. Lecture Notes in Computer Science
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
23
-
-
0020312165
-
Protocols for secure computations
-
IEEE
-
A. C-C. Yao, "Protocols for secure computations," in FOCS '82. IEEE, 1982, pp. 160-164.
-
(1982)
FOCS '82
, pp. 160-164
-
-
Yao, A.C.-C.1
-
24
-
-
0023545076
-
How to play any mental game -a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game -a completeness theorem for protocols with honest majority," in STOC '87, 1987, pp. 218-229.
-
(1987)
STOC '87
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
25
-
-
84945124606
-
Multiparty computation from, threshold homomorphic encryption
-
Springer-Verlag
-
R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from, threshold homomorphic encryption," in EUROCRYPT '01. Springer-Verlag, 2001, pp. 280-299.
-
(2001)
EUROCRYPT '01
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
26
-
-
35248844164
-
Universally composable efficient multiparty computation from threshold homomorphic encryption
-
CRYPTO 2003, Springer-Verlag
-
I. Damgård and J. B. Nielsen, "Universally composable efficient multiparty computation from threshold homomorphic encryption," in CRYPTO 2003, ser. Lecture Notes in Computer Science. Springer-Verlag, 2003, pp. 247-264.
-
(2003)
ser. Lecture Notes in Computer Science
, pp. 247-264
-
-
Damgård, I.1
Nielsen, J.B.2
-
27
-
-
0026839969
-
Modular construction of a byzantine agreement protocol with optimal message bit complexity
-
B. A. Coan and J. L. Welch, "Modular construction of a byzantine agreement protocol with optimal message bit complexity," Information and Computation, vol. 97, no. 1, pp. 61-85, 1992.
-
(1992)
Information and Computation
, vol.97
, Issue.1
, pp. 61-85
-
-
Coan, B.A.1
Welch, J.L.2
-
28
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
New York, NY, USA: ACM Press
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting privacy breaches in privacy preserving data mining," in PODS '03. New York, NY, USA: ACM Press, 2003, pp. 211-222.
-
(2003)
PODS '03
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
29
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
New York, NY, USA: ACM Press
-
W. Du and Z. Zhan, "Using randomized response techniques for privacy-preserving data mining," in KDD '03. New York, NY, USA: ACM Press, 2003, pp. 505-510.
-
(2003)
KDD '03
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
30
-
-
12244255356
-
Privacy-preserving bayesian network structure computation on distributed heterogeneous data
-
New York, NY, USA: ACM Press
-
R. Wright and Z. Yang, "Privacy-preserving bayesian network structure computation on distributed heterogeneous data," in KDD '04. New York, NY, USA: ACM Press, 2004, pp. 713-718.
-
(2004)
KDD '04
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
-
31
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Washington, DC, USA: IEEE Computer Society
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in ICDM '03. Washington, DC, USA: IEEE Computer Society, 2003, p. 99.
-
(2003)
ICDM '03
, pp. 99
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
|