메뉴 건너뛰기




Volumn , Issue , 2008, Pages 311-319

Efficient privacy-preserving k-nearest neighbor search

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION COMPLEXITIES; CORRECTNESS PROOFS; DISTRIBUTED COMPUTING SYSTEMS; INTERNATIONAL CONFERENCES; K-NEAREST NEIGHBOR; K-NEAREST NEIGHBOR SEARCH; K-NN SEARCH; MULTI-STEP; NN SEARCH; OUTLIER DETECTION; PRIVACY-PRESERVING; PRIVACY-PRESERVING DATA MINING; PRIVATE DATA; PROVABLY SECURE; QUADRATIC COMPLEXITY; SEQUENCE DATA; SINGLE-STEP;

EID: 51849139413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2008.79     Document Type: Conference Paper
Times cited : (107)

References (32)
  • 1
    • 0034832620 scopus 로고    scopus 로고
    • Outlier detection for high dimensional data
    • C. C. Aggarwal and P. S. Yu. Outlier detection for high dimensional data. In SIGMOD'01, 2001.
    • (2001) SIGMOD'01
    • Aggarwal, C.C.1    Yu, P.S.2
  • 2
    • 1642327704 scopus 로고    scopus 로고
    • Secure and private sequence comparisons
    • M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In WPES'03, pages 39-44, 2003.
    • (2003) WPES'03 , pp. 39-44
    • Atallah, M.J.1    Kerschbaum, F.2    Du, W.3
  • 3
  • 4
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. Security and composition of multiparty cryptographic protocols. J. Cryptology, pages 143-202, 2000.
    • (2000) J. Cryptology , pp. 143-202
    • Canetti, R.1
  • 7
    • 84926662675 scopus 로고
    • Nearest neighbor pattern classification
    • T. Cover and P. Hart. Nearest neighbor pattern classification. Information Theory, 13:21-27, 1967.
    • (1967) Information Theory , vol.13 , pp. 21-27
    • Cover, T.1    Hart, P.2
  • 8
    • 33745567199 scopus 로고    scopus 로고
    • Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
    • I. Damgård, M. Fitzi, E. Kiltz, J. B. Nielsen, and T. Toft. Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In TCC, pages 285-304, 2006.
    • (2006) TCC , pp. 285-304
    • Damgård, I.1    Fitzi, M.2    Kiltz, E.3    Nielsen, J.B.4    Toft, T.5
  • 10
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen. On private scalar product computation for privacy-preserving data mining. In ICISC, pages 104-120, 2004.
    • (2004) ICISC , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäinen, T.4
  • 11
    • 51849123427 scopus 로고    scopus 로고
    • O. Goldreich. Foundations of Cryptography: II Basic Application. Cambridge University Press, 2004.
    • O. Goldreich. Foundations of Cryptography: Volume II Basic Application. Cambridge University Press, 2004.
  • 12
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious rams
    • O. Goldreich and R. Ostrovsky. Software protection and simulation on oblivious rams. J. ACM, pages 431-473, 1996.
    • (1996) J. ACM , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 13
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng., pages 1026-1037, 2004.
    • (2004) IEEE Trans. Knowl. Data Eng , pp. 1026-1037
    • Kantarcioglu, M.1    Clifton, C.2
  • 14
    • 33749540392 scopus 로고    scopus 로고
    • Privately computing a distributed k-nn classifier
    • M. Kantarcioglu and C. Clifton. Privately computing a distributed k-nn classifier. In PKDD'04, pages 279-290, 2004.
    • (2004) PKDD'04 , pp. 279-290
    • Kantarcioglu, M.1    Clifton, C.2
  • 15
    • 0030714233 scopus 로고    scopus 로고
    • Two algorithms for nearest-neighbor search in high dimensions
    • J. M. Kleinberg. Two algorithms for nearest-neighbor search in high dimensions. In STOC'97, pages 599-608, 1997.
    • (1997) STOC'97 , pp. 599-608
    • Kleinberg, J.M.1
  • 16
    • 0003625004 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. In CRYPTO, 2000.
    • (2000) CRYPTO
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • S. Needleman and C. Wunsch. A general method applicable to the search for similarities in the amino acid sequence of two proteins. J Mol Biol, pages 443-53, 1970.
    • (1970) J Mol Biol , pp. 443-453
    • Needleman, S.1    Wunsch, C.2
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology: EUROCRYPT'99, pages 223-238. Springer, 1999.
    • (1999) Advances in Cryptology: EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 20
    • 0039845384 scopus 로고    scopus 로고
    • Efficient algorithms for mining outliers from large data sets
    • S. Ramaswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. In SIGMOD'00, pages 427-438, 2000.
    • (2000) SIGMOD'00 , pp. 427-438
    • Ramaswamy, S.1    Rastogi, R.2    Shim, K.3
  • 22
    • 84993661650 scopus 로고    scopus 로고
    • Efficient user-adaptable similarity search in large multimedia databases
    • T. Seidl and H.-P. Kriegel. Efficient user-adaptable similarity search in large multimedia databases. In VLDB'97, pages 506-515, 1997.
    • (1997) VLDB'97 , pp. 506-515
    • Seidl, T.1    Kriegel, H.-P.2
  • 23
    • 0032094249 scopus 로고    scopus 로고
    • Optimal multi-step k-nearest neighbor search
    • T. Seidl and H.-P. Kriegel. Optimal multi-step k-nearest neighbor search. In SIGMOD'98, pages 154-165, 1998.
    • (1998) SIGMOD'98 , pp. 154-165
    • Seidl, T.1    Kriegel, H.-P.2
  • 24
    • 51849103902 scopus 로고    scopus 로고
    • Privacy preserving nearest neighbor search
    • M. Shaneck, Y. Kim, and V. Kumar. Privacy preserving nearest neighbor search. In ICDMW'06, pages 541-545, 2006.
    • (2006) ICDMW'06 , pp. 541-545
    • Shaneck, M.1    Kim, Y.2    Kumar, V.3
  • 25
    • 38049174606 scopus 로고    scopus 로고
    • A hybrid multi-group privacypreserving approach for building decision trees
    • Z. Teng and W. Du. A hybrid multi-group privacypreserving approach for building decision trees. In PAKDD, pages 296-307, 2007.
    • (2007) PAKDD , pp. 296-307
    • Teng, Z.1    Du, W.2
  • 27
    • 19544394594 scopus 로고    scopus 로고
    • Privacy-preserving outlier detection
    • J. Vaidya and C. Clifton. Privacy-preserving outlier detection. In ICDM'04, pages 233-240, 2004.
    • (2004) ICDM'04 , pp. 233-240
    • Vaidya, J.1    Clifton, C.2
  • 29
    • 0015960104 scopus 로고
    • The string to string correction problem
    • R. A. Wagner and M. J. Fischer. The string to string correction problem. J. ACM, pages 168-173, 1974.
    • (1974) J. ACM , pp. 168-173
    • Wagner, R.A.1    Fischer, M.J.2
  • 30
    • 35248886066 scopus 로고    scopus 로고
    • Mining multiple private databases using a knn classifier
    • L. Xiong, S. Chitti, and L. Liu. Mining multiple private databases using a knn classifier. In SAC'07, pages 435-440, 2007.
    • (2007) SAC'07 , pp. 435-440
    • Xiong, L.1    Chitti, S.2    Liu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.