-
1
-
-
84883892066
-
Privacy in e-commerce: Examining user scenarios and privacy preferences
-
In: New York
-
Ackerman, M.S., Cranor, L.F., Reagle, J.: Privacy in e-commerce: examining user scenarios and privacy preferences. In: Proceedings of 1st ACM Conference on Electronic Commerce (EC'99), pp. 1-8. New York (1999)
-
(1999)
Proceedings of 1st ACM Conference on Electronic Commerce (EC'99)
, pp. 1-8
-
-
Ackerman, M.S.1
Cranor, L.F.2
Reagle, J.3
-
2
-
-
84945134014
-
Priced oblivious transfer: How to sell digital goods
-
In:
-
Aiello, B., Ishai, Y., Reingold, O.: Priced oblivious transfer: How to sell digital goods. In: Proceedings of Eurocrypt 2001, pp. 119-135 (2001)
-
(2001)
Proceedings of Eurocrypt 2001
, pp. 119-135
-
-
Aiello, B.1
Ishai, Y.2
Reingold, O.3
-
3
-
-
84943241471
-
Clarisse: A machine learning tool to initialize student models
-
In: Biarritz
-
Aïmeur, E., Brassard, G., Dufort, H., Gambs, S.: Clarisse: a machine learning tool to initialize student models. In: Proceedings of 6th International Conference on Intelligent Tutoring Systems (ITS '02), pp. 718-728. Biarritz (2002)
-
(2002)
Proceedings of 6th International Conference on Intelligent Tutoring Systems (ITS '02)
, pp. 718-728
-
-
Aïmeur, E.1
Brassard, G.2
Dufort, H.3
Gambs, S.4
-
4
-
-
33751050410
-
Privacy-preserving demographic filtering
-
In: Dijon
-
Aïmeur, E., Brassard, G., Fernandez, J.M., Mani Onana, F.S.: Privacy-preserving demographic filtering. In: Proceedings of 21st Annual ACM Symposium on Applied Computing (SAC), pp. 872-878. Dijon (2006)
-
(2006)
Proceedings of 21st Annual ACM Symposium on Applied Computing (SAC)
, pp. 872-878
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Mani Onana, F.S.4
-
8
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
In: Santa Barbara
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. In: Proceedings of Crypto 2001, pp. 1-18. Santa Barbara (2001)
-
(2001)
Proceedings of Crypto 2001
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
9
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
In
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 11-19 (1988)
-
(1988)
Proceedings of 20th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 11-19
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
10
-
-
33645586953
-
The anonymizer: Protecting user privacy on the Web
-
Boyan, J.:PThe anonymizer: protecting user privacy on the Web. Comput-Mediated Commun. Magaz. 4 (9) (1997)
-
(1997)
Comput-Mediated Commun. Magaz.
, vol.4
, Issue.9
-
-
Boyan, J.1
-
11
-
-
0002051628
-
Empirical analysis of predictive algorithms for collaborative filtering
-
In: Morgan Kaufman, Madison
-
Breese, J., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings of 14th Conference on Uncertainty in Artificial Intelligence (UAI-98), pp. 43-52. Morgan Kaufman, Madison (1998)
-
(1998)
Proceedings of 14th Conference on Uncertainty in Artificial Intelligence (UAI-98)
, pp. 43-52
-
-
Breese, J.1
Heckerman, D.2
Kadie, C.3
-
12
-
-
0036959356
-
Hybrid recommender systems: Survey and experiments
-
Burke R. (2002). Hybrid recommender systems: Survey and experiments. Customer Model. Customer-Adapted Interaction 4(12): 331-370
-
(2002)
Customer Model. Customer-Adapted Interaction
, vol.4
, Issue.12
, pp. 331-370
-
-
Burke, R.1
-
13
-
-
33645694899
-
Limited knowledge shilling attacks in collaborative filtering systems
-
In: 19th International Joint Conference on Artificial Intelligence (IJCAI 2005) Edinburgh
-
Burke, R., Mobasher, B., Bhaumik, R.: Limited knowledge shilling attacks in collaborative filtering systems. In: Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), 19th International Joint Conference on Artificial Intelligence (IJCAI 2005), pp. 17-24. Edinburgh (2005)
-
(2005)
Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005)
, pp. 17-24
-
-
Burke, R.1
Mobasher, B.2
Bhaumik, R.3
-
14
-
-
33745174191
-
A formal treatment of onion routing
-
In: Santa Barbara
-
Camenisch, J., Lysyanskaya, A.: A formal treatment of onion routing. In: Proceedings of Crypto 2005, pp. 169-187. Santa Barbara (2005)
-
(2005)
Proceedings of Crypto 2005
, pp. 169-187
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Chaum D. (1981). Untraceable electronic mail, return addresses and digital pseudonyms. Commun. ACM 24(2): 84-90
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
19
-
-
0001604533
-
Blind signatures for untraceable payments
-
In: Santa Barbara
-
Chaum, D.: Blind signatures for untraceable payments. In: Proceedings of Crypto 82, pp. 199-203. Santa Barbara (1982)
-
(1982)
Proceedings of Crypto 82
, pp. 199-203
-
-
Chaum, D.1
-
20
-
-
0003062028
-
Blind signatures system
-
In: Santa Barbara
-
Chaum, D.: Blind signatures system. In: Proceedings of Crypto 83, p. 153. Santa Barbara (1983)
-
(1983)
Proceedings of Crypto 83
, pp. 153
-
-
Chaum, D.1
-
21
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum D. (1985). Security without identification: Transaction systems to make big brother obsolete. Commun. ACM 28(10): 1030-1044
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
22
-
-
84898947315
-
Multiparty unconditionally secure protocols
-
In
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols. In: Proceedings of 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 1-10 (1988)
-
(1988)
Proceedings of 20th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 1-10
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
23
-
-
53449100997
-
Multiparty computations ensuring privacy of each party's input and correctness of the result
-
In: Santa Barbara
-
Chaum, D., Damgård, I., van de Graaf, J.: Multiparty computations ensuring privacy of each party's input and correctness of the result. In: Proceedings of Crypto 85, pp. 477-488. Santa Barbara (1985)
-
(1985)
Proceedings of Crypto 85
, pp. 477-488
-
-
Chaum, D.1
Damgård, I.2
van de Graaf, J.3
-
25
-
-
0029541045
-
Private information retrieval
-
In:
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41-51 (1995)
-
(1995)
Proceedings of 36th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
28
-
-
84926662675
-
Nearest neighbor pattern classification
-
Cover T.M. and Hart P.E. (1967). Nearest neighbor pattern classification. IEEE Trans Inf. Theory 13: 21-27
-
(1967)
IEEE Trans Inf. Theory
, vol.13
, pp. 21-27
-
-
Cover, T.M.1
Hart, P.E.2
-
29
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
In:
-
Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Proceedings of Eurocrypt 97, pp. 103-108 (1997)
-
(1997)
Proceedings of Eurocrypt 97
, pp. 103-108
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
30
-
-
84883307749
-
User perceptions of privacy and security on the Web
-
In: Security and Trust (PST) St Andrews
-
Flinn, S., Lumsden, J.: User perceptions of privacy and security on the Web. In: Proceedings of 3rd Annual Conference on Privacy, Security and Trust (PST), pp. 15-26. St Andrews (2005)
-
(2005)
Proceedings of 3rd Annual Conference on Privacy
, pp. 15-26
-
-
Flinn, S.1
Lumsden, J.2
-
32
-
-
33746034080
-
Communities, collaboration and cooperation in personalized Web search
-
In: 19th International Joint Conference on Artificial Intelligence (IJCAI 2005) Edinburgh
-
Freyne, J., Smyth, S.: Communities, collaboration and cooperation in personalized Web search. In: Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), 19th International Joint Conference on Artificial Intelligence (IJCAI 2005), pp. 73-80. Edinburgh (2005)
-
(2005)
Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005)
, pp. 73-80
-
-
Freyne, J.1
Smyth, S.2
-
33
-
-
0012207557
-
Consistent, yet anonymous, Web access with LPWA
-
Gabber E., Gibbons P.B., Kristol D.M., Matias Y. and Mayer A.J. (1999). Consistent, yet anonymous, Web access with LPWA. Commun. ACM 42(2): 42-47
-
(1999)
Commun. ACM
, vol.42
, Issue.2
, pp. 42-47
-
-
Gabber, E.1
Gibbons, P.B.2
Kristol, D.M.3
Matias, Y.4
Mayer, A.J.5
-
34
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
In:
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. In: Proceedings of 30th Annual ACM Symposium on the Theory of Computing (STOC), pp. 151-160 (1998)
-
(1998)
Proceedings of 30th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
35
-
-
84976668719
-
Using collaborative filtering to weave an information tapestry
-
Goldberg D., Nichols D., Oki B.M. and Terry D. (1992). Using collaborative filtering to weave an information tapestry. Commun. ACM 35(12): 61-70
-
(1992)
Commun. ACM
, vol.35
, Issue.12
, pp. 61-70
-
-
Goldberg, D.1
Nichols, D.2
Oki, B.M.3
Terry, D.4
-
36
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
In:
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: Proceedings of 19th Annual ACM Symposium on the Theory of Computing (STOC), pp. 218-229 (1987)
-
(1987)
Proceedings of 19th Annual ACM Symposium on the Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
37
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
Goldschlag D.M., Reed M.G. and Syverson P.F. (1999). Onion routing for anonymous and private internet connections. Commun ACM 42(2): 84-88
-
(1999)
Commun ACM
, vol.42
, Issue.2
, pp. 84-88
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
39
-
-
53449086746
-
-
Harris Interactive: A survey of consumer privacy attitudes and behaviors
-
Harris Interactive: A survey of consumer privacy attitudes and behaviors (2000)
-
(2000)
-
-
-
40
-
-
53449102687
-
-
Harris Interactive: Most people are privacy pragmatists
-
Harris Interactive: Most people are privacy pragmatists (2003)
-
(2003)
-
-
-
43
-
-
35048822047
-
Round-optimal secure two-party computation
-
In: Santa Barbara
-
Katz, J., Ostrovsky, R.: Round-optimal secure two-party computation. In: Proceedings of Crypto 83, pp. 335-354. Santa Barbara (2004)
-
(2004)
Proceedings of Crypto 83
, pp. 335-354
-
-
Katz, J.1
Ostrovsky, R.2
-
45
-
-
0001290002
-
Personalized hypermedia presentation techniques for improving online customer relationships
-
Kobsa A., Koenemann J. and Pohl W. (2001). Personalized hypermedia presentation techniques for improving online customer relationships. Knowl. Eng. Rev. 16(2): 111-155
-
(2001)
Knowl. Eng. Rev.
, vol.16
, Issue.2
, pp. 111-155
-
-
Kobsa, A.1
Koenemann, J.2
Pohl, W.3
-
48
-
-
35048895442
-
Positive results and techniques for obfuscation
-
In:
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Proceedings of Eurocrypt 2004, pp. 20-39 (2004)
-
(2004)
Proceedings of Eurocrypt 2004
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
49
-
-
85084163840
-
Fairplay - A secure two-party computation system
-
In:
-
Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - A secure two-party computation system. In: Proceedings of Usenix Security Symposium, pp. 9-13 (2004)
-
(2004)
Proceedings of Usenix Security Symposium
, pp. 9-13
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
53
-
-
0006544679
-
Automatic personalization based on Web usage mining
-
Mobasher B., Cooley R. and Srivastava J. (2000). Automatic personalization based on Web usage mining. Commun. ACM 43(8): 142-151
-
(2000)
Commun. ACM
, vol.43
, Issue.8
, pp. 142-151
-
-
Mobasher, B.1
Cooley, R.2
Srivastava, J.3
-
54
-
-
0033325071
-
A framework for collaborative, content-based and demographic filtering
-
Pazzani M. (1999). A framework for collaborative, content-based and demographic filtering. Arti. Intell. Rev. 13(5-6): 393-408
-
(1999)
Arti. Intell. Rev.
, vol.13
, Issue.5-6
, pp. 393-408
-
-
Pazzani, M.1
-
55
-
-
0031168547
-
Learning and revising user profiles: The identification of interesting Web sites
-
Pazzani M. and Billsus D. (1997). Learning and revising user profiles: the identification of interesting Web sites. Mach. Learn. 27(5-6): 313-331
-
(1997)
Mach. Learn.
, vol.27
, Issue.5-6
, pp. 313-331
-
-
Pazzani, M.1
Billsus, D.2
-
56
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
In:
-
Pedersen, T.: A threshold cryptosystem without a trusted party. In: Proceedings of Eurocrypt 91, pp. 522-526 (1991)
-
(1991)
Proceedings of Eurocrypt 91
, pp. 522-526
-
-
Pedersen, T.1
-
57
-
-
0001391984
-
Collaborative filtering by personality diagnosis: A hybrid memory- and model-based approach
-
In: Stanford
-
Pennock, D., Horvitz, E., Lawrence, S., Giles, C.L.: Collaborative filtering by personality diagnosis: A hybrid memory- and model-based approach. In: Proceedings of 16th Conference on Uncertainty in Artificial Intelligence (UAI 2000), pp. 473-480. Stanford (2000)
-
(2000)
Proceedings of 16th Conference on Uncertainty in Artificial Intelligence (UAI 2000)
, pp. 473-480
-
-
Pennock, D.1
Horvitz, E.2
Lawrence, S.3
Giles, C.L.4
-
60
-
-
24944580011
-
Privacy-preserving collaborative filtering
-
Polat H. and Du W. (2005). Privacy-preserving collaborative filtering. Int. J. Electron. Commerce 9(4): 9-35
-
(2005)
Int. J. Electron. Commerce
, vol.9
, Issue.4
, pp. 9-35
-
-
Polat, H.1
Du, W.2
-
62
-
-
85030174634
-
Grouplens: An open architecture for collaborative filtering of netnews
-
In: Chapel Hill
-
Resnick, P., Iacovou, N., Sushak, M., Bergstrom, P., Riedl, J.: Grouplens: An open architecture for collaborative filtering of netnews. In: Proceedings of Computer Supported Collaborative Work Conference (CSCW), pp. 175-186. Chapel Hill (1994)
-
(1994)
Proceedings of Computer Supported Collaborative Work Conference (CSCW)
, pp. 175-186
-
-
Resnick, P.1
Iacovou, N.2
Sushak, M.3
Bergstrom, P.4
Riedl, J.5
-
63
-
-
33645663804
-
-
Prepared for the Office of the Federal Privacy Commissioner, Sydney. Accessed 29 April 2006
-
Roy Morgan Research: Privacy and the community. Prepared for the Office of the Federal Privacy Commissioner, Sydney. www.privacy.gov.au/ publications/rcommunity.html. Accessed 29 April 2006 (2001)
-
(2001)
Roy Morgan Research: Privacy and the Community
-
-
-
64
-
-
0031104175
-
SiteSeer: Personalized navigation for the Web
-
Rucker J. and Polanco M. (1997). SiteSeer: Personalized navigation for the Web. Commun. ACM 40(3): 73-75
-
(1997)
Commun ACM
, vol.40
, Issue.3
, pp. 73-75
-
-
Rucker, J.1
Polanco, M.2
-
67
-
-
84883877353
-
Recommender systems in e-commerce
-
In: Denver
-
Schafer, J.B., Konstan, J.A., Riedl, J.: Recommender systems in e-commerce. In: Proceedings of 1st ACM Conference on Electronic Commerce (EC'99), pp. 158-166. Denver (1999)
-
(1999)
Proceedings of 1st ACM Conference on Electronic Commerce (EC'99)
, pp. 158-166
-
-
Schafer, J.B.1
Konstan, J.A.2
Riedl, J.3
-
69
-
-
0038588436
-
E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior
-
In
-
Spiekermann, S., Groβklags, J., Berendt, B.: E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. In: Proceedings of 3rd ACM Conference on Electronic Commerce (EC'01), pp. 38-47 (2001)
-
(2001)
Proceedings of 3rd ACM Conference on Electronic Commerce (EC'01)
, pp. 38-47
-
-
Spiekermann, S.1
Groβklags, J.2
Berendt, B.3
-
70
-
-
51849086084
-
A fuzzy hybrid collaborative filtering technique for web personalization
-
In: (IJCAI 2005) Edinburgh
-
Suryavanshi, B., Shiri, N., Mudur, S.: A fuzzy hybrid collaborative filtering technique for web personalization. In: Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005), 19th International Joint Conference on Artificial Intelligence (IJCAI 2005), pp. 1-8. Edinburgh (2005)
-
(2005)
Proceedings of 3rd International Workshop on Intelligent Techniques for Web Personalization (ITWP 2005) 19th International Joint Conference on Artificial Intelligence
, pp. 1-8
-
-
Suryavanshi, B.1
Shiri, N.2
Mudur, S.3
-
71
-
-
16444372472
-
Impacts of user privacy preferences on personalized systems - A comparative study
-
In: Karat, C.M., Blom, J. and Karat, J. (eds) Kluwer, Dordrecht
-
Teltzrow M. and Kobsa A. (2004). Impacts of user privacy preferences on personalized systems - a comparative study. In: Karat, C.M., Blom, J. and Karat, J. (eds) Designing Personalized user Experiences for eCommerce., pp 315-332. Kluwer, Dordrecht
-
(2004)
Designing Personalized User Experiences for ECommerce.
, pp. 315-332
-
-
Teltzrow, M.1
Kobsa, A.2
-
73
-
-
53449097535
-
-
UMR: Privacy concerns loom large. Survey summary, Auckland: PC of New Zealand. Accessed 29 April 2006
-
UMR: Privacy concerns loom large. Conducted for the Privacy Commissioner of New Zealand. Survey summary, Auckland: PC of New Zealand. www.privacy.org.nz/privword/42pr.html. Accessed 29 April 2006 (2001)
-
(2001)
Conducted for the Privacy Commissioner of New Zealand
-
-
-
74
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
Verykios V.S., Bertino E., Fovino I.N., Provenza L.P., Saygin Y. and Theodoridis Y. (2004). State-of-the-art in privacy preserving data mining. ACM SIGMOD Record 33(1): 50-57
-
(2004)
ACM SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
78
-
-
2942525472
-
Information transparency of business-to-business electronic markets: A game-theoretic analysis
-
Zhu K. (2004). Information transparency of business-to-business electronic markets: A game-theoretic analysis. Manage. Sci. 50(5): 670-685
-
(2004)
Manage. Sci.
, vol.50
, Issue.5
, pp. 670-685
-
-
Zhu, K.1
|