-
1
-
-
70249116551
-
-
AOL "(online), available at: accessed 2 December 2008"
-
AOL (2006), "AOL keyword searches" (online), available at: http://dontdelete.com/default.asp (accessed 2 December 2008).
-
(2006)
AOL Keyword Searches
-
-
-
2
-
-
4344573261
-
Reducing the servers computation in private information retrieval: PIR with preprocessing
-
Beimel, A., Ishai, Y. and Malkin, T. (2004), "Reducing the servers computation in private information retrieval: PIR with preprocessing", Journal of Cryptology, Vol.17, pp. 125-151.
-
(2004)
Journal of Cryptology
, vol.17
, pp. 125-151
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
3
-
-
70249089805
-
-
Technion, Israel Institute of Technology, Haifa
-
Chor, B., Gilboa, N. and Naor, M. (1997), Technical Report TR CS0917, Private information retrieval by keywords, Department of Computer Science, Technion, Israel Institute of Technology, Haifa.
-
(1997)
Technical Report TR CS0917, Private Information Retrieval by Keywords, Department of Computer Science
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
4
-
-
0029541045
-
Private information retrieval
-
23-25 October, IEEE
-
Chor, B., Goldreich, O., Kushilevitz, E. and Sudan, M. (1995), "Private information retrieval", in Proccedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS), 23-25 October, IEEE, pp. 41-50.
-
(1995)
Proccedings of the 36th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
5
-
-
0032201622
-
Private information retrieval
-
Chor, B., Goldreich, O., Kushilevitz, E. and Sudan, M. (1998), "Private information retrieval", Journal of the ACM, Vol.45, pp. 965-981.
-
(1998)
Journal of the ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
6
-
-
38049048780
-
A three-dimensional conceptual framework for database privacy, in Secure Data Management - 4th VLDB Workshop (SDM 2007)
-
Springer, Berlin and Heidelberg
-
Domingo-Ferrer, J. (2007), "A three-dimensional conceptual framework for database privacy, in Secure Data Management - 4th VLDB Workshop (SDM 2007)", Lecture Notes in Computer Science, Vol.4721, Springer, Berlin and Heidelberg, pp. 193-202.
-
(2007)
Lecture Notes in Computer Science
, vol.4721
, pp. 193-202
-
-
Domingo-Ferrer, J.1
-
7
-
-
54049094706
-
A measure of variance for nominal hierarchical attributes
-
Domingo-Ferrer, J. and Solanas, A. (2008), "A measure of variance for nominal hierarchical attributes", Information Sciences, Vol.178, pp. 4644-4655.
-
(2008)
Information Sciences
, vol.178
, pp. 4644-4655
-
-
Domingo-Ferrer, J.1
Solanas, A.2
-
8
-
-
37649020602
-
A polynomial-time approximation to optimal multivariate microaggregation
-
Domingo-Ferrer, J., Sebe, F. and Solanas, A. (2008), "A polynomial-time approximation to optimal multivariate microaggregation", Computers and Mathematics with Applications, Vol.55, pp. 714-732.
-
(2008)
Computers and Mathematics with Applications
, vol.55
, pp. 714-732
-
-
Domingo-Ferrer, J.1
Sebe, F.2
Solanas, A.3
-
9
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser, S. and Micali, S. (1984), "Probabilistic encryption", Journal of Computer and Systems Science, Vol.28 No.1, pp. 270-299.
-
(1984)
Journal of Computer and Systems Science
, vol.28
, Issue.1
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
79958707212
-
TrackMeNot: Resisting surveillance in web search
-
Kerr, I., Steeves, V. and Lucock, C. (Eds), Oxford University Press, Oxford
-
Howe, D.C. and Nissenbaum, H. (2009), "TrackMeNot: Resisting surveillance in web search", in Kerr, I., Steeves, V. and Lucock, C. (Eds), Lessons from the Identity Trail: Privacy, Anonymity and Identity in a Networked Society, Oxford University Press, Oxford.
-
(2009)
Lessons from the Identity Trail: Privacy, Anonymity and Identity in A Networked Society
-
-
Howe, D.C.1
Nissenbaum, H.2
-
11
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
20-22 October, IEEE
-
Kushilevitz, E. and Ostrovsky, R. (1997), "Replication is not needed: Single database, computationally-private information retrieval", in Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 20-22 October, IEEE, pp. 364-373.
-
(1997)
Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
12
-
-
62249168275
-
Data access in a cyber world: Making use of cyberinfrastructure
-
Lane, J., Heus, P. and Mulcahy, T. (2008), "Data access in a cyber world: Making use of cyberinfrastructure", Transactions on Data Privacy, Vol.1 No.1, pp. 2-16.
-
(2008)
Transactions on Data Privacy
, vol.1
, Issue.1
, pp. 2-16
-
-
Lane, J.1
Heus, P.2
Mulcahy, T.3
-
13
-
-
0345274550
-
-
Longman, London
-
Leech, G., Rayson, P. and Wilson, A. (2001), Word Frequencies in Written and Spoken English: Based on the British National Corpus, Longman, London.
-
(2001)
Word Frequencies in Written and Spoken English: Based on the British National Corpus
-
-
Leech, G.1
Rayson, P.2
Wilson, A.3
-
14
-
-
38049002436
-
A survey of single-database PIR: Techniques and applications, in public key cryptography - PKC 2007
-
Springer, Berlin and Heidelberg
-
Ostrovsky, R. and Skeith, W.E. III (2007), "A survey of single-database PIR: Techniques and applications, in public key cryptography - PKC 2007", Lecture Notes in Computer Science, Vol.4450, Springer, Berlin and Heidelberg, pp. 393-411.
-
(2007)
Lecture Notes in Computer Science
, vol.4450
, pp. 393-411
-
-
Ostrovsky, R.1
Skeith Iii, W.E.2
-
15
-
-
0003483188
-
-
Technical report, SRI International, Menlo Park, CA
-
Samarati, P. and Sweeney, L. (1998), Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression, Technical report, SRI International, Menlo Park, CA.
-
(1998)
Protecting Privacy When Disclosing Information: K-anonymity and Its Enforcement Through Generalization and Suppression
-
-
Samarati, P.1
Sweeney, L.2
-
16
-
-
0000163989
-
A mathematical theory of communication
-
Shannon, C.E. (1948), "A mathematical theory of communication", Bell Systems Technical Journal, Vol.14 No.1, pp. 7-13.
-
(1948)
Bell Systems Technical Journal
, vol.14
, Issue.1
, pp. 7-13
-
-
Shannon, C.E.1
-
17
-
-
84872236868
-
Web-based inference detection
-
Staddon, J., Golle, P. and Zimny, B. (2007), "Web-based inference detection", in Proceedings of the 16th USENIX Security Symposium, The Advanced Computer Systems Association, pp. 71-86.
-
(2007)
In Proceedings of the 16th USENIX Security Symposium, the Advanced Computer Systems Association
, pp. 71-86
-
-
Staddon, J.1
Golle, P.2
Zimny, B.3
|