-
2
-
-
0034827009
-
-
Agrawal, D., Aggarwal, C.: On the design and quantification of privacy-preserving data mining algorithms. In: PODS (2001)
-
Agrawal, D., Aggarwal, C.: On the design and quantification of privacy-preserving data mining algorithms. In: PODS (2001)
-
-
-
-
3
-
-
0041783510
-
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD (2000)
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD (2000)
-
-
-
-
4
-
-
33244468835
-
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: PODS (2005)
-
Blum, A., Dwork, C., McSherry, F., Nissim, K.: Practical privacy: the SuLQ framework. In: PODS (2005)
-
-
-
-
5
-
-
0003802343
-
-
Wadsworth, Belmont
-
Breiman, L., Friedman, J.H., Olshen, R.A., Stone, C.J.: Classification and Regression Trees. Wadsworth, Belmont (1984)
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
6
-
-
71549138933
-
-
CCS 2007
-
Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: CCS (2007)
-
Privacy-preserving remote diagnostics
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
7
-
-
79960907469
-
-
Foresti, S, Samarati, P, k-anonymity. Secure Data Management in Decentralized Systems
-
Ciriani, V., De Capitani di Vimercati, S., Foresti, S., Samarati, P.: k-anonymity. Secure Data Management in Decentralized Systems (2007)
-
(2007)
Vimercati, S
-
-
Ciriani, V.1
Capitani di, D.2
-
8
-
-
70350360758
-
-
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: ICDM (2002)
-
Du, W., Zhan, Z.: Building decision tree classifier on private data. In: ICDM (2002)
-
-
-
-
9
-
-
35048856104
-
Privacy-preserving data mining on vertically partitioned databases
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Dwork, C., Nissim, K.: Privacy-preserving data mining on vertically partitioned databases. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 528-544. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 528-544
-
-
Dwork, C.1
Nissim, K.2
-
10
-
-
1142263341
-
-
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacypreserving data mining. In: PODS (2003)
-
Evfimievski, A., Gehrke, J., Srikant, R.: Limiting privacy breaches in privacypreserving data mining. In: PODS (2003)
-
-
-
-
11
-
-
38049046515
-
-
Ishai, Y., Paskin, A.: Evaluating branching programs on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, 4392, pp. 575-594. Springer, Heidelberg (2007)
-
Ishai, Y., Paskin, A.: Evaluating branching programs on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
-
-
-
-
12
-
-
38049136533
-
Efficient two-party secure computation on committed inputs
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Jarecki, S., Shmatikov, V.: Efficient two-party secure computation on committed inputs. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 97-114. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 97-114
-
-
Jarecki, S.1
Shmatikov, V.2
-
13
-
-
70350420421
-
-
Kruger, L.: Sfe-tools (2008), http://pages.cs.wisc.edu/~lpkruger/sfe/
-
(2008)
Sfe-tools
-
-
Kruger, L.1
-
16
-
-
33746437508
-
Privacy preserving data mining
-
Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptology 15(3), 177-206 (2002)
-
(2002)
J. Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
18
-
-
33749607006
-
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: -diversity: Privacy beyond k-anonymity. In: ICDE (2006)
-
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: -diversity: Privacy beyond k-anonymity. In: ICDE (2006)
-
-
-
-
19
-
-
34548748619
-
-
Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-case background knowledge for privacy-preserving data publishing. In: ICDE (2007)
-
Martin, D., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.: Worst-case background knowledge for privacy-preserving data publishing. In: ICDE (2007)
-
-
-
-
21
-
-
35448937300
-
-
Nergiz, M., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared database. In: SIGMOD (2007)
-
Nergiz, M., Atzori, M., Clifton, C.: Hiding the presence of individuals from shared database. In: SIGMOD (2007)
-
-
-
-
23
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 223. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223
-
-
Paillier, P.1
-
24
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1), 81-106 (1986)
-
(1986)
Mach. Learn
, vol.1
, Issue.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
27
-
-
0036811662
-
-
Sweeney, L.: Int. J. Uncertain. Fuzziness Knowl.-Based Syst. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557-570 (2002)
-
Sweeney, L.: Int. J. Uncertain. Fuzziness Knowl.-Based Syst. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557-570 (2002)
-
-
-
-
28
-
-
70350421212
-
-
Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: DBSec (2005)
-
Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: DBSec (2005)
-
-
-
-
29
-
-
45749132089
-
Privacy-preserving Naive Bayes classification
-
Vaidya, J., Kantarcioglu, M., Clifton, C.: Privacy-preserving Naive Bayes classification. The VLDB Journal 17(4) (2008)
-
(2008)
The VLDB Journal
, vol.17
, Issue.4
-
-
Vaidya, J.1
Kantarcioglu, M.2
Clifton, C.3
-
30
-
-
84880121624
-
-
Yang, Z., Zhong, S., Wright, R.: Privacy-preserving classification of customer data without loss of accuracy. In: SDM (2005)
-
Yang, Z., Zhong, S., Wright, R.: Privacy-preserving classification of customer data without loss of accuracy. In: SDM (2005)
-
-
-
-
31
-
-
0022882770
-
-
Yao, A.: How to generate and exchange secrets. In: FOCS (1986)
-
Yao, A.: How to generate and exchange secrets. In: FOCS (1986)
-
-
-
|