-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
ACM, Santa Barbara, California, USA
-
Agrawal, D., Aggarwal, C.C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, pp. 247-255. ACM, Santa Barbara, California, USA (2001). http://doi.acm.org/10.1145/375551. 375602
-
(2001)
Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.C.2
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
ACM, Dallas, TX
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pp. 439-450. ACM, Dallas, TX (2000). http://doi.acm.org/10.1145/342009.335438
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
A. Odlyzko (ed.) Lecture Notes in Computer Science, Springer Heidelberg
-
Benaloh, J.C.: Secret sharing homomorphisms: Keeping shares of a secret secret. In: A. Odlyzko (ed.) Advances in Cryptography-CRYPTO86: Proceedings, vol. 263, pp. 251-260. Lecture Notes in Computer Science, Springer Heidelberg (1986). http://springerlink.metapress.com/openurl.asp? genre=article&issn= 0302-9743&volume=263&spage=251
-
(1986)
Advances in Cryptography-CRYPTO86: Proceedings
, vol.263
, pp. 251-260
-
-
Benaloh, J.C.1
-
4
-
-
35048869172
-
An efficient probabilistic public-key encryption that hides all partial information
-
R. (ed.) Springer, Heidelberg
-
Blum, M., Goldwasser, S.: An efficient probabilistic public-key encryption that hides all partial information. In: R. (ed.) Advances in Cryptology-Crypto 84 Proceedings. Springer, Heidelberg (1984)
-
(1984)
Advances in Cryptology-Crypto 84 Proceedings
-
-
Blum, M.1
Goldwasser, S.2
-
5
-
-
84946847417
-
Oblivious polynomial evaluation and oblivious neural learning
-
citeseer.nj.nec. com/531490.html
-
Chang, Y.C., Lu, C.J.: Oblivious polynomial evaluation and oblivious neural learning. Lecture Notes in Computer Science, vol. 2248, pp. 369+ (2001). citeseer.nj.nec. com/531490.html
-
(2001)
Lecture Notes in Computer Science
, vol.2248
-
-
Chang, Y.C.1
Lu, C.J.2
-
6
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
Chor B. and Kushilevitz E (1993). A communication-privacy tradeoff for modular addition. Inf. Process. Lett. 45: 205-210
-
(1993)
Inf. Process. Lett.
, vol.45
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
7
-
-
45749099724
-
Oblivious Polynomial Evaluation
-
paper by Naor and Pinkas
-
Cramer, R., Gilboa, N., Naor, M., Pinkas, B., Poupard, G.: Oblivious Polynomial Evaluation. In: The Privacy Preserving Data Mining (paper by Naor and Pinkas) (2000)
-
(2000)
The Privacy Preserving Data Mining
-
-
Cramer, R.1
Gilboa, N.2
Naor, M.3
Pinkas, B.4
Poupard, G.5
-
9
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Cloudcroft, New Mexico, USA
-
Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: A review and open problems. In: New Security Paradigms Workshop, pp. 11-20. Cloudcroft, New Mexico, USA (2001). http://www.cerias. purdue.edu/homes/duw/research/paper/nspw2001.ps
-
(2001)
New Security Paradigms Workshop
, pp. 11-20
-
-
Du, W.1
Atallah, M.J.2
-
10
-
-
1642302606
-
Building decision tree classifier on private data
-
C. Clifton, V. Estivill-Castro (eds.) Australian Computer Society, Maebashi City, Japan
-
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: C. Clifton, V. Estivill-Castro (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 1-8. Australian Computer Society, Maebashi City, Japan (2002). http://crpit.com/ Vol14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
11
-
-
0003187764
-
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official J. Eur. Communities I(281), 31-50 (1995) http://europa.eu.int/comm/internal_market/ privacy
-
(1995)
Official J. Eur. Communities
, vol.1
, Issue.281
, pp. 31-50
-
-
-
12
-
-
0022080529
-
A randomized protocol for signing contracts
-
6
-
Even S., Goldreich O. and Lempel A (1985). A randomized protocol for signing contracts. Commun. ACM 28(6): 637-647
-
(1985)
Commun. ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, Canada
-
Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217-228. Edmonton, Alberta, Canada (2002). http://doi.acm.org/10.1145/775047.775080
-
(2002)
The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
14
-
-
27144521475
-
-
U.S. Senate Bill (proposed)
-
Feingold, M., Corzine, M., Wyden, M., Nelson, M.: Data Mining Moratorium Act of 2003. U.S. Senate Bill (proposed) (2003). http://thomas.loc.gov/cgi-bin/ query/z?c108:S.188:
-
(2003)
Data Mining Moratorium Act of 2003
-
-
Feingold, M.1
Corzine, M.2
Wyden, M.3
Nelson, M.4
-
15
-
-
24944523186
-
On secure scalar product computation for privacy-preserving data mining
-
C. Park S. Chee (eds.)
-
Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On secure scalar product computation for privacy-preserving data mining. In: C. Park S. Chee (eds.) The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), vol. 3506, pp. 104-120 (2004)
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
-
16
-
-
0003979335
-
-
chap. General Cryptographic Protocols. Cambridge University Press, Cambridge
-
Goldreich, O.: The Foundations of Cryptography, vol. 2, chap. General Cryptographic Protocols. Cambridge University Press, Cambridge (2004). http://www.wisdom. weizmann.ac.il/~oded/PSBookFrag/prot.ps
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
17
-
-
0023545076
-
How to play any mental game-a completeness theorem for protocols with honest majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: 19th ACM Symposium on the Theory of Computing, pp. 218-229 (1987). http://doi.acm.org/10.1145/ 28395.28420
-
(1987)
19th ACM Symposium on the Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
0037077422
-
Standard for privacy of individually identifiable health information
-
Standard for privacy of individually identifiable health information. Fed. Regist. 67(157), 53,181-53,273 (2002). http://www.hhs.gov/ocr/hipaa/ finalreg.html
-
(2002)
Fed. Regist.
, vol.67
, Issue.157
, pp. 53181-53273
-
-
-
19
-
-
29844458622
-
Deriving private information from randomized data
-
Baltimore, MD
-
Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD (2005)
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
-
-
Huang, Z.1
Du, W.2
Chen, B.3
-
20
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
Vancouver, British Columbia
-
Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: The 2002 International Conference on Parallel Processing, Vancouver, British Columbia (2002)
-
(2002)
The 2002 International Conference on Parallel Processing
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
21
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
Chicago, IL
-
Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, pp. 593-599 (2005)
-
(2005)
Proceedings of the 2005 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 593-599
-
-
Jagannathan, G.1
Wright, R.N.2
-
22
-
-
1642335029
-
An architecture for privacy- preserving mining of client information
-
C. Clifton V. Estivill-Castro (eds.) Australian Computer Society, Maebashi City, Japan
-
Kantarcioglu, M., Vaidya, J.: An architecture for privacy- preserving mining of client information. In: C. Clifton V. Estivill-Castro (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, vol. 14, pp. 37-42. Australian Computer Society, Maebashi City, Japan (2002). http://crpit.com/Vol14.html
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 37-42
-
-
Kantarcioglu, M.1
Vaidya, J.2
-
23
-
-
1142282764
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
Madison, Wisconsin
-
KantarcIoǧlu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02), Madison, Wisconsin, pp. 24-31 (2002) http://www.bell-labs.com/ user/minos/DMKD02/Papers/kantarcioglu.pdf
-
(2002)
The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD'02)
, pp. 24-31
-
-
Kantarcioǧlu, M.1
-
24
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
KantarcIoǧlu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026-1037 (2004) http://doi.ieeecomputersociety.org/10.1109/ TKDE. 2004.45
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioǧlu, M.1
-
25
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Melbourne, Florida
-
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM'03). Melbourne, Florida (2003)
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM'03)
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
26
-
-
19744365747
-
Privacy preserving clustering with distributed em mixture modeling
-
Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8(1), 68-81 (2005) http://dx.doi.org/10.1007/s10115-004-0148-7
-
(2005)
Knowl. Inf. Syst.
, vol.8
, Issue.1
, pp. 68-81
-
-
Lin, X.1
Clifton, C.2
Zhu, M.3
-
28
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177-206 (2002) http://www.research. ibm.com/people/l/lindell//id3_abs. html
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
29
-
-
0004255908
-
-
McGraw-Hill Science/Engineering/Math, New York
-
Mitchell, T.: Machine Learning, 1st edn. McGraw-Hill Science/Engineering/ Math, New York (1997)
-
(1997)
Machine Learning, 1st Edn.
-
-
Mitchell, T.1
-
30
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
ACM Press, San Francisco, California, United States doi: http://doi.acm.org/10.1145/288090.288106
-
Naccache, D., Stern, J.: A new public key cryptosystem based on higher residues. In: Proceedings of the 5th ACM conference on Computer and communications security, pp. 59-66. ACM Press, San Francisco, California, United States (1998). doi: http://doi.acm.org/10.1145/288090.288106
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
31
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
ACM Press, Atlanta, Georgia, United States doi: http://doi.acm.org/10. 1145/301250.301312
-
Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: Proceedings of the 31st annual ACM symposium on Theory of computing, pp. 245-254. ACM Press, Atlanta, Georgia, United States (1999). doi: http://doi.acm.org/10.1145/301250.301312
-
(1999)
Proceedings of the 31st Annual ACM Symposium on Theory of Computing
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
33
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring. In: Advances in Cryptology-Eurocrypt '98
-
Springer, Heidelberg
-
Okamoto, T., Uchiyama, S.: A new public-key cryptosystem as secure as factoring. In: Advances in Cryptology-Eurocrypt '98, LNCS 1403, pp. 308-318. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
34
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings
-
Springer, Heidelberg
-
Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings, LNCS 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
35
-
-
45749109450
-
-
Perry J.M.: Statement of John M. Perry, President and CEO, Cardsystems Solutions, Inc. before the United States House of Representatives Subcommittee on Oversight and Investigations of the Committee on Financial services. http://financialservices.house.gov/hearings.asp? formmode=detail&hearing =407&comm=4(2005). http: //financialservices.house.gov/hearings.asp? formmode=deta il&hearing=407&comm=4
-
Perry, J.M.: Statement of John M. Perry, President and CEO, Cardsystems Solutions, Inc. before the United States House of Representatives Subcommittee on Oversight and Investigations of the Committee on Financial services. http://financialservices.house.gov/hearings.asp? formmode=detail&hearing =407&comm=4(2005). http: //financialservices.house.gov/hearings.asp? formmode=deta il&hearing=407&comm=4
-
-
-
-
38
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada
-
Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp. 639-644. (2002). http://doi.acm.org/10.1145/775047.775142
-
(2002)
The 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
40
-
-
2942536415
-
Privacy preserving naïve bayes classifier for vertically partitioned data
-
Lake Buena Vista, Florida
-
Vaidya, J., Clifton, C.: Privacy preserving naïve bayes classifier for vertically partitioned data. In: 2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida, pp. 522-526 (2004) http://www.siam.org/ meetings/sdm04/proceedings/sdm04_059.pdf
-
(2004)
2004 SIAM International Conference on Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
42
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Vaidya J., Clifton C.: Secure set intersection cardinality with application to association rule mining. J. Comput. Secur. 13(4) (2005).
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.4
-
-
Vaidya, J.1
Clifton, C.2
|