-
1
-
-
1142303699
-
Information Sharing Across Private Databases
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information Sharing Across Private Databases," Proc. 22nd ACM SICMOD Int'l Conf. Management of Data, pp. 86-97, 2003.
-
(2003)
Proc. 22nd ACM SICMOD Int'l Conf. Management of Data
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
3
-
-
84976804419
-
How to Exchange (Secret) Keys
-
M. Blum, "How to Exchange (Secret) Keys," ACM Trans. Computer Systems, vol. 1, no. 2, pp. 175-193, 1983.
-
(1983)
ACM Trans. Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
4
-
-
10044273842
-
Tools for Privacy Preserving Distributed Data Mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M.Y. Zhu, "Tools for Privacy Preserving Distributed Data Mining," SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
6
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
M.J. Freedman, K. Nissim, and B. Pinkas, "Efficient Private Matching and Set Intersection," Advances in Cryptography: Eurocrypt, pp. 1-19, 2004.
-
(2004)
Advances in Cryptography: Eurocrypt
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
10
-
-
4544361334
-
Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data
-
M. Kantarcioglu and C. Clifton, "Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data," IEEE Trans. Knowledge and Data Eng., vol. 16, pp. 1026-1037, 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng
, vol.16
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
13
-
-
34248345975
-
Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection
-
J.J. Parekh, K. Wang, and S.J. Stolfo, "Privacy-Preserving Payload-Based Correlation for Accurate Malicious Traffic Detection," Proc. SIGCOMM Workshop Large-Scale Attack Defense, pp. 99-106, 2006.
-
(2006)
Proc. SIGCOMM Workshop Large-Scale Attack Defense
, pp. 99-106
-
-
Parekh, J.J.1
Wang, K.2
Stolfo, S.J.3
-
14
-
-
84919085619
-
An Improved Algorithm for Computing Logarithms in GF(p) and Its Cryptographic Significance
-
S.C. Pohlig and M.E. Hellman, "An Improved Algorithm for Computing Logarithms in GF(p) and Its Cryptographic Significance," IEEE Trans. Information Theory, vol. 24, no. 1, pp. 106-111, 1978.
-
(1978)
IEEE Trans. Information Theory
, vol.24
, Issue.1
, pp. 106-111
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
15
-
-
3042680831
-
Mental Poker
-
A. Shamir, R.L. Rivest, and L.M. Adleman, "Mental Poker," Math. Gardner, pp. 37-43, 1981.
-
(1981)
Math. Gardner
, pp. 37-43
-
-
Shamir, A.1
Rivest, R.L.2
Adleman, L.M.3
-
16
-
-
32344451483
-
Anonymity-Preserving Data Collection
-
Z. Yang, S. Zhong, and R.N. Wright, "Anonymity-Preserving Data Collection," Proc. 11th ACM SICKDD Int'l Conf. Knowledge Discovery in Data Mining, pp. 334-343, 2005.
-
(2005)
Proc. 11th ACM SICKDD Int'l Conf. Knowledge Discovery in Data Mining
, pp. 334-343
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
-
18
-
-
46649086794
-
On Privacy Protection in Distributed Information Sharing,
-
Technical Report CSE-2007-7, Univ. of Texas, Arlington
-
N. Zhang and W. Zhao, "On Privacy Protection in Distributed Information Sharing," Technical Report CSE-2007-7, Univ. of Texas, Arlington, 2007.
-
(2007)
-
-
Zhang, N.1
Zhao, W.2
|