-
1
-
-
67549131320
-
-
Paper Number: 20051120001
-
Gagan Aggarwal, Tomas Feder, Krishnaram Kenthapadi, Rajeev Motwani, Rina Panigrahy, Dilys Thomas, An Zhu, Approximation algorithms for k-anonymity, Journal of Privacy Technology, Paper Number: 20051120001, 2005.
-
(2005)
Approximation algorithms for k-anonymity, Journal of Privacy Technology
-
-
Aggarwal, G.1
Feder, T.2
Kenthapadi, K.3
Motwani, R.4
Panigrahy, R.5
Thomas, D.6
Zhu, A.7
-
2
-
-
35048875418
-
-
G. Aggarwal, N. Mishra, B. Pinkas, Secure computation of the kth-ranked element, in: EUROCRYPT, 2004, pp. 40-55.
-
G. Aggarwal, N. Mishra, B. Pinkas, Secure computation of the kth-ranked element, in: EUROCRYPT, 2004, pp. 40-55.
-
-
-
-
3
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
D. Agrawal, C. Aggarwal, On the design and quantification of privacy preserving data mining algorithms, in: Proceedings of the 20th ACM PODS, 2001, pp. 247-255.
-
(2001)
Proceedings of the 20th ACM PODS
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.2
-
6
-
-
84945309966
-
Proofs of knowledge for non-monotone discrete-log formulae and applications
-
Emmanuel Bresson, Jacques Stern, Proofs of knowledge for non-monotone discrete-log formulae and applications, in: Proceedings of the ISC, 2002, pp. 272-288.
-
(2002)
Proceedings of the ISC
, pp. 272-288
-
-
Bresson, E.1
Stern, J.2
-
8
-
-
0019532104
-
Untraceable electronic mail, return address and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return address and digital pseudonyms. Communications of the ACM 24 2 (1981) 84-88
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
0023861309
-
The dining cryptographers problem: unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1 1 (1988) 65-75
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
12
-
-
0000072558
-
Finding a needle in a haystack or identifying anonymous census records
-
Dalenius T. Finding a needle in a haystack or identifying anonymous census records. Journal of Official Statistics 2 3 (1986) 329-336
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
14
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
W. Du, Z. Zhan, Using randomized response techniques for privacy-preserving data mining, in: Proceedings of the Ninth ACM SIGKDD, 2003, pp. 505-510.
-
(2003)
Proceedings of the Ninth ACM SIGKDD
, pp. 505-510
-
-
Du, W.1
Zhan, Z.2
-
15
-
-
67549113055
-
-
C. Dwork, K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in: CRYPTO 2003, 2004.
-
C. Dwork, K. Nissim, Privacy-preserving datamining on vertically partitioned databases, in: CRYPTO 2003, 2004.
-
-
-
-
16
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
A. Evfimievski, J. Gehrke, R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proceedings 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2003, pp. 211-222.
-
(2003)
Proceedings 22nd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
17
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, J. Gehrke, Privacy preserving mining of association rules, in: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002, pp. 217-228.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
18
-
-
28444499680
-
Top-down specialization for information and privacy preservation
-
Tokyo, Japan, April
-
B. Fung, K. Wang, P.S. Yu, Top-down specialization for information and privacy preservation, in: Proceedings of the 21st International Conference on Data Engineering, Tokyo, Japan, April 2005.
-
(2005)
Proceedings of the 21st International Conference on Data Engineering
-
-
Fung, B.1
Wang, K.2
Yu, P.S.3
-
19
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat, A. Shamir, How to prove yourself: practical solutions to identification and signature problems, in: Advances in Cryptology - Crypto'86, 1986, pp. 186-194.
-
(1986)
Advances in Cryptology - Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
20
-
-
12244293654
-
-
B. Gilburd, A. Schuster, R. Wolff, k-TTP: a new privacy model for large-scale distributed environments, in: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2004, pp. 563-568.
-
B. Gilburd, A. Schuster, R. Wolff, k-TTP: a new privacy model for large-scale distributed environments, in: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2004, pp. 563-568.
-
-
-
-
25
-
-
84958742387
-
Optimistic mixing for exit-polls
-
Springer-Verlag
-
Golle P., Zhong S., Boneh D., Jakobsson M., and Juels A. Optimistic mixing for exit-polls. Advances in Cryptology - ASIACRYPT 2002 (2002), Springer-Verlag 451-465
-
(2002)
Advances in Cryptology - ASIACRYPT 2002
, pp. 451-465
-
-
Golle, P.1
Zhong, S.2
Boneh, D.3
Jakobsson, M.4
Juels, A.5
-
27
-
-
56949092341
-
A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks
-
Hsu C., and Chuang Y. A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks. Information Sciences 179 4 (2009) 422-429
-
(2009)
Information Sciences
, vol.179
, Issue.4
, pp. 422-429
-
-
Hsu, C.1
Chuang, Y.2
-
31
-
-
34248346949
-
-
Topics in Cryptology CT-RSA
-
Qinglin Jiang, Douglas S. Reeves, Peng Ning, Improving robustness of pgp keyrings by conflict detection, in: Topics in Cryptology CT-RSA, 2004, pp. 194-207.
-
(2004)
Improving robustness of pgp keyrings by conflict detection
, pp. 194-207
-
-
Jiang, Q.1
Reeves, D.S.2
Ning, P.3
-
32
-
-
1142282764
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
M. Kantarcioglu, C. Clifton, Privacy-preserving distributed mining of association rules on horizontally partitioned data, in: DMKD'02, 2002, pp. 24-31.
-
(2002)
DMKD'02
, pp. 24-31
-
-
Kantarcioglu, M.1
Clifton, C.2
-
33
-
-
1642335029
-
An architecture for privacy-preserving mining of client information
-
Maebashi City, Japan, December
-
M. Kantarcioglu, J. Vaidya, An architecture for privacy-preserving mining of client information, in: Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining. Maebashi City, Japan, December 2002, pp. 37-42.
-
(2002)
Proceedings of the IEEE ICDM Workshop on Privacy, Security and Data Mining
, pp. 37-42
-
-
Kantarcioglu, M.1
Vaidya, J.2
-
34
-
-
67549097495
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, K. Sivakumar, On the privacy preserving properties of random data perturbation techniques. in: The Third ICDM, 2003.
-
(2003)
The Third ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
35
-
-
35748979448
-
Privacy preserving data mining of sequential patterns for network traffic data
-
Kim S., Park S., Won J., and Kim S. Privacy preserving data mining of sequential patterns for network traffic data. Information Sciences 178 3 (2008) 694-713
-
(2008)
Information Sciences
, vol.178
, Issue.3
, pp. 694-713
-
-
Kim, S.1
Park, S.2
Won, J.3
Kim, S.4
-
36
-
-
33749568323
-
Workload-aware anonymization
-
Kristen LeFevre, David J. DeWitt, Raghu Ramakrishnan, Workload-aware anonymization, in: Proceedings of the ACM SIGKDD, 2006, pp. 277-286.
-
(2006)
Proceedings of the ACM SIGKDD
, pp. 277-286
-
-
LeFevre, K.1
DeWitt, D.J.2
Ramakrishnan, R.3
-
37
-
-
0036312325
-
Hordes - a multicast based protocol for anonymity
-
Levine B.N., and Shields C. Hordes - a multicast based protocol for anonymity. Journal of Computer Security 10 3 (2002) 213-240
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 213-240
-
-
Levine, B.N.1
Shields, C.2
-
38
-
-
33746437508
-
Privacy preserving data mining
-
Lindell Y., and Pinkas B. Privacy preserving data mining. Journal of Cryptology 15 3 (2002) 177-206
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
39
-
-
33749607006
-
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd ICDE, 2006.
-
A. Machanavajjhala, J. Gehrke, D. Kifer, M. Venkitasubramaniam, l-Diversity: privacy beyond k-anonymity, in: Proceedings of the 22nd ICDE, 2006.
-
-
-
-
41
-
-
85027158725
-
-
EUROCRYPT 93
-
C. Park, K. Itoh, K. Kurosawa, Efficient anonymous channel and all/nothing election scheme, in: EUROCRYPT 93, 1993, pp. 248-259.
-
(1993)
Efficient anonymous channel and all/nothing election scheme
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
42
-
-
67549083795
-
-
European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities, 1995, p. 31.
-
European Parliament, Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Communities, 1995, p. 31.
-
-
-
-
43
-
-
67549128178
-
-
European Parliament, Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concering the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 1998, pp. 1-8.
-
European Parliament, Directive 97/66/EC of the European Parliament and of the Council of 15 December 1997 concering the processing of personal data and the protection of privacy in the telecommunications sector, Official Journal of the European Communities, 1998, pp. 1-8.
-
-
-
-
46
-
-
0001574460
-
Receipt-free Mix-type voting schemes - a practical solution to the implementation of a voting booth
-
K. Sako, J. Kilian, Receipt-free Mix-type voting schemes - a practical solution to the implementation of a voting booth, in: Proceedings of the EUROCRYPT 95, 1995, pp. 393-403.
-
(1995)
Proceedings of the EUROCRYPT
, vol.95
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
47
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
abstract
-
P. Samarati, L. Sweeney, Generalizing data to provide anonymity when disclosing information (abstract), in: Proceedings of the 17th PODS, 1998, p. 188.
-
(1998)
Proceedings of the 17th PODS
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
48
-
-
67549131319
-
Secure computation over distributed databases
-
Su C., and Sakurai K. Secure computation over distributed databases. IPSJ Journal (2005)
-
(2005)
IPSJ Journal
-
-
Su, C.1
Sakurai, K.2
-
49
-
-
34548646069
-
Two methods for privacy preserving data mining with malicious participants
-
Shah D., and Zhong S. Two methods for privacy preserving data mining with malicious participants. Information Sciences 177 23 (2007) 5468-5483
-
(2007)
Information Sciences
, vol.177
, Issue.23
, pp. 5468-5483
-
-
Shah, D.1
Zhong, S.2
-
53
-
-
84958979582
-
On the security of ElGamal-based encryption
-
Y. Tsiounis, M. Yung, On the security of ElGamal-based encryption, in: Public Key Cryptography'98, 1998, pp. 117-134.
-
(1998)
Public Key Cryptography'98
, pp. 117-134
-
-
Tsiounis, Y.1
Yung, M.2
-
54
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
J. Vaidya, C. Clifton, Privacy-preserving k-means clustering over vertically partitioned data, in: Proceedings of the Ninth ACM SIGKDD, 2003, pp. 206-215.
-
(2003)
Proceedings of the Ninth ACM SIGKDD
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
56
-
-
14844282596
-
-
L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in: Proceedings of the ACM CCS, 2003, pp. 122-130.
-
L. von Ahn, A. Bortz, N.J. Hopper, k-anonymous message transmission, in: Proceedings of the ACM CCS, 2003, pp. 122-130.
-
-
-
-
57
-
-
84896508047
-
Unconditional sender and recipient untraceability in spite of active attacks
-
M. Waidner, Unconditional sender and recipient untraceability in spite of active attacks, in: EUROCRYPT'89, 1989, pp. 302-319.
-
(1989)
EUROCRYPT'89
, pp. 302-319
-
-
Waidner, M.1
-
58
-
-
19544380211
-
Bottom-up generalization: A data mining solution to privacy protection
-
K. Wang, P.S. Yu, S. Chakraborty, Bottom-up generalization: a data mining solution to privacy protection, in: The Fourth ICDM, 2004, pp. 249-256.
-
(2004)
The Fourth ICDM
, pp. 249-256
-
-
Wang, K.1
Yu, P.S.2
Chakraborty, S.3
-
60
-
-
33749571958
-
-
Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD, 2006, pp. 754-759.
-
Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang, (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing, in: Proceedings of the ACM SIGKDD, 2006, pp. 754-759.
-
-
-
-
61
-
-
12244255356
-
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
-
R.N. Wright, Z. Yang, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, in: Proceedings of the 10th ACM SIGKDD, 2004, pp. 713-718.
-
(2004)
Proceedings of the 10th ACM SIGKDD
, pp. 713-718
-
-
Wright, R.N.1
Yang, Z.2
-
62
-
-
33749582207
-
Utility-based anonymization using local recoding
-
Jian Xu, Wei Wang, Jian Pei, Xiaoyuan Wang, Baile Shi, Ada Wai-Chee Fu, Utility-based anonymization using local recoding, in: Proceedings of the ACM SIGKDD, 2006, pp. 785-790.
-
(2006)
Proceedings of the ACM SIGKDD
, pp. 785-790
-
-
Xu, J.1
Wang, W.2
Pei, J.3
Wang, X.4
Shi, B.5
Wai-Chee Fu, A.6
-
66
-
-
2442705676
-
GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences
-
Yin M.M., and Wang J.T.L. GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences. Information Sciences 163 1-3 (2004) 201-218
-
(2004)
Information Sciences
, vol.163
, Issue.1-3
, pp. 201-218
-
-
Yin, M.M.1
Wang, J.T.L.2
-
67
-
-
33646140552
-
A false negative approach to mining frequent itemsets from high speed transactional data streams
-
Yu J.X., Chong Z., Lu H., Zhang Z., and Zhou A. A false negative approach to mining frequent itemsets from high speed transactional data streams. Information Sciences 176 16 (2006) 1986-2015
-
(2006)
Information Sciences
, vol.176
, Issue.16
, pp. 1986-2015
-
-
Yu, J.X.1
Chong, Z.2
Lu, H.3
Zhang, Z.4
Zhou, A.5
-
68
-
-
19744364896
-
Fuzzy reasoning model under quotient space structure
-
Zhang L., and Zhang B. Fuzzy reasoning model under quotient space structure. Information Sciences 176 4 (2005) 353-364
-
(2005)
Information Sciences
, vol.176
, Issue.4
, pp. 353-364
-
-
Zhang, L.1
Zhang, B.2
-
70
-
-
33750333499
-
Privacy-preserving algorithms for distributed mining of frequent itemsets
-
Zhong S. Privacy-preserving algorithms for distributed mining of frequent itemsets. Information Sciences 177 2 (2007) 490-503
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 490-503
-
-
Zhong, S.1
-
71
-
-
46749124396
-
Guided perturbation: towards private and accurate mining
-
Zhong S., and Yang Z. Guided perturbation: towards private and accurate mining. VLDB Journal 17 5 (2008) 1165-1177
-
(2008)
VLDB Journal
, vol.17
, Issue.5
, pp. 1165-1177
-
-
Zhong, S.1
Yang, Z.2
|