-
1
-
-
0041783510
-
Privacy-preserving data mining
-
ACM Press
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In SIGMOD '00, pages 439-450. ACM Press, 2000.
-
(2000)
SIGMOD '00
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
New York, NY, USA, ACM Press
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In PODS '05, pages 128-138, New York, NY, USA, 2005. ACM Press.
-
(2005)
PODS '05
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
3
-
-
0036082701
-
Collaborative filtering with privacy
-
Oakland, CA, May
-
J. Canny. Collaborative filtering with privacy. In IEEE Symposium on Security and Privacy, pages 45-57, Oakland, CA, May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 45-57
-
-
Canny, J.1
-
4
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
ACM Press
-
J. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR '02, pages 238-245. ACM Press, 2002.
-
(2002)
SIGIR '02
, pp. 238-245
-
-
Canny, J.1
-
5
-
-
0022199386
-
Verifiable secret sharing and achieving simultaneity in the presence of faults
-
B. Chor, S. Goldwasser, S. Micali, and B. Awerbuch. Verifiable secret sharing and achieving simultaneity in the presence of faults. In IEEE Foundations of Computer Science, pages 383-395, 1985.
-
(1985)
IEEE Foundations of Computer Science
, pp. 383-395
-
-
Chor, B.1
Goldwasser, S.2
Micali, S.3
Awerbuch, B.4
-
6
-
-
56049109090
-
Map-reduce for machine learning on multicore
-
C.-T. Chu, S. K. Kim, Y.-A. Lin, Y. Yu, G. Bradski, A. Y. Ng, and K. Olukotun. Map-reduce for machine learning on multicore. In NIPS 2006, 2006.
-
(2006)
NIPS 2006
-
-
Chu, C.-T.1
Kim, S.K.2
Lin, Y.-A.3
Yu, Y.4
Bradski, G.5
Ng, A.Y.6
Olukotun, K.7
-
7
-
-
22044443106
-
Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free?
-
Springer-Verlag
-
R. Cramer and I. Damgård. Zero-knowledge proof for finite field arithmetic, or: Can zero-knowledge be for free? In CRYPTO '98. Springer-Verlag, 1998.
-
(1998)
CRYPTO '98
-
-
Cramer, R.1
Damgård, I.2
-
8
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Springer-Verlag
-
R. Cramer, I. Damgård, and J. B. Nielsen. Multiparty computation from threshold homomorphic encryption. In EUROCRYPT '01, pages 280-299. Springer-Verlag, 2001.
-
(2001)
EUROCRYPT '01
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
-
9
-
-
35348914807
-
Google news personalization: Scalable online collaborative filtering
-
New York, NY, USA, ACM Press
-
A. S. Das, M. Datar, A. Garg, and S. Rajaram. Google news personalization: scalable online collaborative filtering. In WWW '07, pages 271-280, New York, NY, USA, 2007. ACM Press.
-
(2007)
WWW '07
, pp. 271-280
-
-
Das, A.S.1
Datar, M.2
Garg, A.3
Rajaram, S.4
-
10
-
-
1142275486
-
Revealing information while preserving privacy
-
New York, NY, USA, ACM Press
-
I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS '03, pages 202-210, New York, NY, USA, 2003. ACM Press.
-
(2003)
PODS '03
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
11
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
W. Du, Y. Han, and S. Chen. Privacy-preserving multivariate statistical analysis: Linear regression and classification. In SIAM International Conference on Data Mining, pages 222-233, 2004.
-
(2004)
SIAM International Conference on Data Mining
, pp. 222-233
-
-
Du, W.1
Han, Y.2
Chen, S.3
-
12
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
ACM Press
-
W. Du and Z. Zhan. Using randomized response techniques for privacy-preserving data mining. In KDD '03, pages 505-510. ACM Press, 2003.
-
(2003)
KDD '03
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
13
-
-
33751096728
-
Zero-knowledge test of vector equivalence and granulation of user data with privacy
-
Y. Duan and J. Canny. Zero-knowledge test of vector equivalence and granulation of user data with privacy. In IEEE GrC 2006, 2006.
-
(2006)
IEEE GrC 2006
-
-
Duan, Y.1
Canny, J.2
-
14
-
-
33644750145
-
A secure online algorithm for link analysis on weighted graph
-
Y. Duan, J. Wang, M. Kam, and J. Canny. A secure online algorithm for link analysis on weighted graph. In Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM Data Mining Conference, 2005, pages 71-81.
-
(2005)
Proceedings of the Workshop on Link Analysis, Counterterrorism and Security, SIAM Data Mining Conference
, pp. 71-81
-
-
Duan, Y.1
Wang, J.2
Kam, M.3
Canny, J.4
-
15
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
TCC 2006, of, Springer
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC 2006, volume 3876 of LNCS, pages 265-284. Springer, 2006.
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
16
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
ACM Press
-
A. Evfimievski, J. Gehrke, and R. Srikant. Limiting privacy breaches in privacy preserving data mining. In PODS '03, pages 211-222. ACM Press, 2003.
-
(2003)
PODS '03
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
17
-
-
33746018016
-
General adversaries in unconditional multi-party computation
-
ASIACRYPT 99, of, Springer-Verlag
-
M. Fitzi, M. Hirt, and U. Maurer. General adversaries in unconditional multi-party computation. In ASIACRYPT 99, volume 1716 of LNCS, pages 232-246. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1716
, pp. 232-246
-
-
Fitzi, M.1
Hirt, M.2
Maurer, U.3
-
18
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
ACM Press
-
R. Gennaro, M. O. Rabin, and T. Rabin. Simplified vss and fast-track multiparty computations with applications to threshold cryptography. In PODC '98, pages 101-111. ACM Press, 1998.
-
(1998)
PODC '98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
19
-
-
52649144240
-
-
O. Goldreich. Foundations of Cryptography: 2 Basic Applications. Cambridge University Press, 2004.
-
O. Goldreich. Foundations of Cryptography: Volume 2 Basic Applications. Cambridge University Press, 2004.
-
-
-
-
20
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. Journal of Cryptology, 7(1):1-32, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
21
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
22
-
-
0030693496
-
Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract)
-
M. Hirt and U. Maurer. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract). In PODC '97, pages 25-34, 1997.
-
(1997)
PODC '97
, pp. 25-34
-
-
Hirt, M.1
Maurer, U.2
-
23
-
-
33745999816
-
Player simulation and general adversary structures in perfect multiparty computation
-
M. Hirt and U. Maurer. Player simulation and general adversary structures in perfect multiparty computation. Journal of Cryptology, 13(1):31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
24
-
-
3042742744
-
Latent semantic models for collaborative filtering
-
T. Hofmann. Latent semantic models for collaborative filtering. ACM Transactions on Information Systems, 22(1):89-115, 2004.
-
(2004)
ACM Transactions on Information Systems
, vol.22
, Issue.1
, pp. 89-115
-
-
Hofmann, T.1
-
25
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioglu and C. Clifton. Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9):1026-1037, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.9
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
26
-
-
78149340011
-
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM '03, page 99, Washington, DC, USA, 2003. IEEE Computer Society.
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM '03, page 99, Washington, DC, USA, 2003. IEEE Computer Society.
-
-
-
-
27
-
-
0027188175
-
Efficient noise-tolerant learning from statistical queries
-
New York, NY, USA, ACM Press
-
M. Kearns. Efficient noise-tolerant learning from statistical queries. In STOC '93, pages 392-401, New York, NY, USA, 1993. ACM Press.
-
(1993)
STOC '93
, pp. 392-401
-
-
Kearns, M.1
-
28
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. Journal of cryptology, 15(3):177-206, 2002.
-
(2002)
Journal of cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
30
-
-
84982943258
-
Non-interactive and informationtheoretic secure verifiable secret sharing
-
CRYPTO '91, of, Springer-Verlag
-
T. Pedersen. Non-interactive and informationtheoretic secure verifiable secret sharing. In CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pedersen, T.1
-
33
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
New York, NY, USA, ACM Press
-
J. Vaidya and C. Clifton. Privacy preserving association rule mining in vertically partitioned data. In KDD '02, pages 639-644, New York, NY, USA, 2002. ACM Press.
-
(2002)
KDD '02
, pp. 639-644
-
-
Vaidya, J.1
Clifton, C.2
-
34
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
New York, NY, USA, ACM Press
-
J. Vaidya and C. Clifton. Privacy-preserving k-means clustering over vertically partitioned data. In KDD '03, pages 206-215, New York, NY, USA, 2003. ACM Press.
-
(2003)
KDD '03
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
35
-
-
12244255356
-
Privacy-preserving bayesian network structure computation on distributed heterogeneous data
-
New York, NY, USA, ACM Press
-
R. Wright and Z. Yang. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD '04, pages 713-718, New York, NY, USA, 2004. ACM Press.
-
(2004)
KDD '04
, pp. 713-718
-
-
Wright, R.1
Yang, Z.2
-
36
-
-
84880121624
-
Privacy-preserving classification of customer data without loss of accuracy
-
Z. Yang, S. Zhong, and R. N. Wright. Privacy-preserving classification of customer data without loss of accuracy. In SDM 2005, 2005.
-
(2005)
SDM 2005
-
-
Yang, Z.1
Zhong, S.2
Wright, R.N.3
|