-
3
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal of Uncertainty, Fuzziness, and Knowledge-based Systems., vol. 5, pp. 557-570, 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness, and Knowledge-based Systems
, vol.5
, pp. 557-570
-
-
Sweeney, L.1
-
7
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
Cloudcroft, New Mexico
-
W. Du and M. J. Atallah, "Secure multi-party computation problems and their applications: a review and open problems," in Proceedings of the 2001 workshop on New security paradigms, Cloudcroft, New Mexico, 2001.
-
(2001)
Proceedings of the 2001 workshop on New security paradigms
-
-
Du, W.1
Atallah, M.J.2
-
8
-
-
0032201622
-
Private information retrieval
-
B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, "Private information retrieval," J. ACM, vol. 45, pp. 965-981, 1998.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
10
-
-
0034782679
-
Selective private function evaluation with applications to private statistics
-
Newport, Rhode Island, United States
-
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright, "Selective private function evaluation with applications to private statistics," in Proceedings of the twentieth annual ACM symposium on Principles of distributed computing, Newport, Rhode Island, United States, 2001.
-
(2001)
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
11
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explor. Newsl., vol. 4, pp. 28-34, 2002.
-
(2002)
SIGKDD Explor. Newsl
, vol.4
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
12
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient Private Matching and Set Intersection.," in EUROCRYPT'04, 2004, pp. 1-19.
-
(2004)
EUROCRYPT'04
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in EUROCRYPT'99, 1999, pp. 223-238.
-
(1999)
EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
19
-
-
30044439511
-
Privacy-preserving credit checking
-
Vancouver, BC, Canada
-
K. Frikken, M. Atallah, and C. Zhang, "Privacy-preserving credit checking," in Proceedings of the 6th ACM conference on Electronic commerce, Vancouver, BC, Canada, 2005.
-
(2005)
Proceedings of the 6th ACM conference on Electronic commerce
-
-
Frikken, K.1
Atallah, M.2
Zhang, C.3
-
20
-
-
33748485156
-
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
-
K. Frikken, M. Atallah, and J. Li, "Attribute-Based Access Control with Hidden Policies and Hidden Credentials," IEEE Trans. Comput., vol. 55, pp. 1259-1270, 2006.
-
(2006)
IEEE Trans. Comput
, vol.55
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
21
-
-
27644520949
-
Secure outsourcing of sequence comparisons
-
M. J. Atallah and J. Li, "Secure outsourcing of sequence comparisons," Int. J. Inf. Secur., vol. 4, pp. 277-287, 2005.
-
(2005)
Int. J. Inf. Secur
, vol.4
, pp. 277-287
-
-
Atallah, M.J.1
Li, J.2
-
22
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
Washington DC, USA
-
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, "Private collaborative forecasting and benchmarking," in ACM workshop on Privacy in the electronic society, Washington DC, USA, 2004.
-
(2004)
ACM workshop on Privacy in the electronic society
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
|