-
2
-
-
1142303699
-
Information sharing across private databases
-
Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proc. of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 86-97 (2003)
-
(2003)
Proc. of the 2003 ACM SIGMOD International Conference on Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
5
-
-
84947778144
-
-
Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, 1423, pp. 48-63. Springer, Heidelberg (1998)
-
Boneh, D.: The decision Diffie-Hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol. 1423, pp. 48-63. Springer, Heidelberg (1998)
-
-
-
-
6
-
-
24144433396
-
-
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilián, J. (ed.) TCC 2005. LNCS, 3378, pp. 325-341. Springer, Heidelberg (2005)
-
Boneh, D., Goh, E., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilián, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
Canetti, R., Ishai, Y., Kumar, R., Reiter, M., Rubinfeld, R., Wright, R.: Selective private function evaluation with applications to private statistics. In: Proc. of the 20th Annual ACM Symposium on Principles of Distributed Computing, pp. 293-304 (2001)
-
(2001)
Proc. of the 20th Annual ACM Symposium on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.4
Rubinfeld, R.5
Wright, R.6
-
9
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory IT-31(4) (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
-
-
ElGamal, T.1
-
10
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proc. of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 211-222 (2003)
-
(2003)
Proc. of the 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
11
-
-
0242625281
-
Privacy preserving mining of association rules
-
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proc. of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217-228 (2002)
-
(2002)
Proc. of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
12
-
-
33748996753
-
Secure multiparty computation of approximations
-
Feigenbaum, J., Ishai, Y., Malkin, T., Nissim, K., Strauss, M., Wright, R.: Secure multiparty computation of approximations. ACM Transactions on Algorithms 2(3), 435-472 (2005)
-
(2005)
ACM Transactions on Algorithms
, vol.2
, Issue.3
, pp. 435-472
-
-
Feigenbaum, J.1
Ishai, Y.2
Malkin, T.3
Nissim, K.4
Strauss, M.5
Wright, R.6
-
13
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
24944523186
-
-
Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, Springer, Heidelberg (2005)
-
Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, Springer, Heidelberg (2005)
-
-
-
-
15
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography, Volume II: Basic Applications. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
16
-
-
0023545076
-
How to play ANY mental game
-
Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: Proc. of the 19th Annual ACM Conference on Theory of Computing, pp. 218-229 (1987)
-
(1987)
Proc. of the 19th Annual ACM Conference on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
33745565439
-
Polylogarithmic private approximations and efficient matching
-
Prof. of the Third Theory of Cryptography Conference, Springer, Heidelberg
-
Indyk, P., Woodruff, D.: Polylogarithmic private approximations and efficient matching. In: Prof. of the Third Theory of Cryptography Conference. LNCS, Springer, Heidelberg (2006)
-
(2006)
LNCS
-
-
Indyk, P.1
Woodruff, D.2
-
23
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: The Third IEEE International Conference on Data Mining (2003)
-
(2003)
The Third IEEE International Conference on Data Mining
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
24
-
-
33749576809
-
Cryptographically private support vector machines
-
Laur, S., Lipmaa, H., Mielikäinen, T.: Cryptographically private support vector machines. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 618-624 (2006)
-
(2006)
Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 618-624
-
-
Laur, S.1
Lipmaa, H.2
Mielikäinen, T.3
-
25
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptology 15(3), 177-206 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
19544378656
-
Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data
-
Technical Report TR-CS-03-24, Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County
-
Liu, K., Kargupta, H., Ryan, J.: Multiplicative noise, random projection, and privacy preserving data mining from distributed multi-party data. Technical Report TR-CS-03-24, Computer Science and Electrical Engineering Department, University of Maryland, Baltimore County (2003)
-
(2003)
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
27
-
-
19544375935
-
Privacy-sensitive Bayesian network parameter learning
-
Brighton, UK
-
Meng, D., Sivakumar, K., Kargupta, H.: Privacy-sensitive Bayesian network parameter learning. In: Proc. of the Fourth IEEE International Conference on Data Mining, Brighton, UK (2004)
-
(2004)
Proc. of the Fourth IEEE International Conference on Data Mining
-
-
Meng, D.1
Sivakumar, K.2
Kargupta, H.3
-
30
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data,
-
Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data,. In: Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data, Mining, pp. 206-215 (2003)
-
(2003)
Proc. of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data, Mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
32
-
-
41849120257
-
-
Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: The 19th Annual IFIP WG 11.3 Working Conference on Data, and Applications Security (2005)
-
Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: The 19th Annual IFIP WG 11.3 Working Conference on Data, and Applications Security (2005)
-
-
-
-
33
-
-
33646358700
-
Experimental analysis of a privacy-preserving scalar product protocol
-
Yang, Z., Subramaniam, H., Wright, R.N.: Experimental analysis of a privacy-preserving scalar product protocol. International Journal of Computer Systems Science and Engineering 21(1), 47-52 (2006)
-
(2006)
International Journal of Computer Systems Science and Engineering
, vol.21
, Issue.1
, pp. 47-52
-
-
Yang, Z.1
Subramaniam, H.2
Wright, R.N.3
-
34
-
-
33746929480
-
Privacy-preserving computation of Bayesian networks on vertically partitioned data
-
Yang, Z., Wright, R.: Privacy-preserving computation of Bayesian networks on vertically partitioned data. IEEE Transactions on Data Knowledge Engineering 18(9) (2006)
-
(2006)
IEEE Transactions on Data Knowledge Engineering
, vol.18
, Issue.9
-
-
Yang, Z.1
Wright, R.2
|