-
1
-
-
0034832620
-
Outlier detection for high dimensional data
-
C. C. Aggarwal and P. S. Yu. Outlier detection for high dimensional data. In SIGMOD'01, 2001.
-
(2001)
SIGMOD'01
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
2
-
-
1642327704
-
Secure and private sequence comparisons
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In WPES'03, pages 39-44, 2003.
-
(2003)
WPES'03
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
3
-
-
0031653130
-
Fast nearest neighbor search in high-dimensional space
-
S. Berchtold, B. Ertl, D. A. Keim, H.-P. Kriegel, and T. Seidl. Fast nearest neighbor search in high-dimensional space. In ICDE'98, pages 209-218, 1998.
-
(1998)
ICDE'98
, pp. 209-218
-
-
Berchtold, S.1
Ertl, B.2
Keim, D.A.3
Kriegel, H.-P.4
Seidl, T.5
-
4
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, pages 143-202, 2000.
-
(2000)
J. Cryptology
, pp. 143-202
-
-
Canetti, R.1
-
5
-
-
10044273842
-
Tools for privacy preserving data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu. Tools for privacy preserving data mining. SIGKDD Explorations, pages 28-34, 2002.
-
(2002)
SIGKDD Explorations
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
6
-
-
0004116989
-
-
MIT Press, 2nd edition
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, 2nd edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
7
-
-
84926662675
-
Nearest neighbor pattern classification
-
T. Cover and P. Hart. Nearest neighbor pattern classification. Information Theory, 13:21-27, 1967.
-
(1967)
Information Theory
, vol.13
, pp. 21-27
-
-
Cover, T.1
Hart, P.2
-
8
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In TCC, pages 285-304, 2006.
-
(2006)
TCC
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
10
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen. On private scalar product computation for privacy-preserving data mining. In ICISC, pages 104-120, 2004.
-
(2004)
ICISC
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
11
-
-
51849123427
-
-
O. Goldreich. Foundations of Cryptography: II Basic Application. Cambridge University Press, 2004.
-
O. Goldreich. Foundations of Cryptography: Volume II Basic Application. Cambridge University Press, 2004.
-
-
-
-
12
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, pages 431-473, 1996.
-
(1996)
J. ACM
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
13
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng., pages 1026-1037, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
14
-
-
33749540392
-
Privately computing a distributed k-nn classifier
-
M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In PKDD'04, pages 279-290, 2004.
-
(2004)
PKDD'04
, pp. 279-290
-
-
Kantarcioglu, M.1
Clifton, C.2
-
15
-
-
0030714233
-
Two algorithms for nearest-neighbor search in high dimensions
-
J. M. Kleinberg. Two algorithms for nearest-neighbor search in high dimensions. In STOC'97, pages 599-608, 1997.
-
(1997)
STOC'97
, pp. 599-608
-
-
Kleinberg, J.M.1
-
16
-
-
0003625004
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. In CRYPTO, 2000.
-
(2000)
CRYPTO
-
-
Lindell, Y.1
Pinkas, B.2
-
17
-
-
85084163840
-
Fairplay - secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay - secure two-party computation system. In USENIX Security Symposium, pages 287-302, 2004.
-
(2004)
USENIX Security Symposium
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
18
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
S. Needleman and C. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol, pages 443-53, 1970.
-
(1970)
J Mol Biol
, pp. 443-453
-
-
Needleman, S.1
Wunsch, C.2
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology: EUROCRYPT'99, pages 223-238. Springer, 1999.
-
(1999)
Advances in Cryptology: EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
S. Ramaswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. In SIGMOD'00, pages 427-438, 2000.
-
(2000)
SIGMOD'00
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
22
-
-
84993661650
-
Efficient user-adaptable similarity search in large multimedia databases
-
T. Seidl and H.-P. Kriegel. Efficient user-adaptable similarity search in large multimedia databases. In VLDB'97, pages 506-515, 1997.
-
(1997)
VLDB'97
, pp. 506-515
-
-
Seidl, T.1
Kriegel, H.-P.2
-
23
-
-
0032094249
-
Optimal multi-step k-nearest neighbor search
-
T. Seidl and H.-P. Kriegel. Optimal multi-step k-nearest neighbor search. In SIGMOD'98, pages 154-165, 1998.
-
(1998)
SIGMOD'98
, pp. 154-165
-
-
Seidl, T.1
Kriegel, H.-P.2
-
24
-
-
51849103902
-
Privacy preserving nearest neighbor search
-
M. Shaneck, Y. Kim, and V. Kumar. Privacy preserving nearest neighbor search. In ICDMW'06, pages 541-545, 2006.
-
(2006)
ICDMW'06
, pp. 541-545
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
25
-
-
38049174606
-
A hybrid multi-group privacypreserving approach for building decision trees
-
Z. Teng and W. Du. A hybrid multi-group privacypreserving approach for building decision trees. In PAKDD, pages 296-307, 2007.
-
(2007)
PAKDD
, pp. 296-307
-
-
Teng, Z.1
Du, W.2
-
27
-
-
19544394594
-
Privacy-preserving outlier detection
-
J. Vaidya and C. Clifton. Privacy-preserving outlier detection. In ICDM'04, pages 233-240, 2004.
-
(2004)
ICDM'04
, pp. 233-240
-
-
Vaidya, J.1
Clifton, C.2
-
28
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis. State-of-the-art in privacy preserving data mining. SIGMOD Rec., pages 50-57, 2004.
-
(2004)
SIGMOD Rec
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
29
-
-
0015960104
-
The string to string correction problem
-
R. A. Wagner and M. J. Fischer. The string to string correction problem. J. ACM, pages 168-173, 1974.
-
(1974)
J. ACM
, pp. 168-173
-
-
Wagner, R.A.1
Fischer, M.J.2
-
30
-
-
35248886066
-
Mining multiple private databases using a knn classifier
-
L. Xiong, S. Chitti, and L. Liu. Mining multiple private databases using a knn classifier. In SAC'07, pages 435-440, 2007.
-
(2007)
SAC'07
, pp. 435-440
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
|