-
1
-
-
74049103179
-
Secure two-party k-means clustering
-
ACM Press, New York
-
Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proc. of CCS 2007, pp. 486-497. ACM Press, New York (2007)
-
(2007)
Proc. of CCS 2007
, pp. 486-497
-
-
Bunn, P.1
Ostrovsky, R.2
-
3
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
Pfitzmann, B. (ed.) EUROCRYPT 2001. Springer, Heidelberg
-
Cramer, R., Damg̊ard, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-299. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 280-299
-
-
Cramer, R.1
Damg̊ard, I.B.2
Nielsen, J.B.3
-
5
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Damg̊ard, I.B., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285-304. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 285-304
-
-
Damg̊ard, I.B.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.B.4
Toft, T.5
-
10
-
-
0004115628
-
-
Doyle, P., Lane, J., Theeuwes, J., Zayatz, L. (eds.): Elsevier Science, Amsterdam
-
Doyle, P., Lane, J., Theeuwes, J., Zayatz, L. (eds.): Confidentiality, disclosure, and data access: theory and practical applications for statistical agencies. Elsevier Science, Amsterdam (2001)
-
(2001)
Confidentiality, Disclosure, and Data Access: Theory and Practical Applications for Statistical Agencies
-
-
-
11
-
-
33746335051
-
Differential privacy
-
Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. Springer, Heidelberg
-
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1-12. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
12
-
-
51849089628
-
New efficient attacks on statistical disclosure control mechanisms
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Dwork, C., Yekhanin, S.: New efficient attacks on statistical disclosure control mechanisms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 469-480. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 469-480
-
-
Dwork, C.1
Yekhanin, S.2
-
13
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
Frankel, Y. (ed.) FC 2000. Springer, Heidelberg
-
Fouque, P.A., Poupard, G., Stern, J.: Sharing decryption in the context of voting or lotteries. In: Frankel, Y. (ed.) FC 2000. LNCS, vol. 1962, pp. 90-104. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1962
, pp. 90-104
-
-
Fouque, P.A.1
Poupard, G.2
Stern, J.3
-
16
-
-
0002956175
-
A method for limiting disclosure in microdata based on random noise and transformation
-
Kim, J.J.: A method for limiting disclosure in microdata based on random noise and transformation. In: Proc. of the ASA Section on Survey Research Methodology, pp. 303-308 (1986)
-
(1986)
Proc. of the ASA Section on Survey Research Methodology
, pp. 303-308
-
-
Kim, J.J.1
-
17
-
-
62249168275
-
Data access in a cyber world: Making use of cyberinfrastructure
-
Lane, J., Heus, P., Mulcahy, T.: Data access in a cyber world: making use of cyberinfrastructure. Transactions on Data Privacy 1(1), 2-16 (2008)
-
(2008)
Transactions on Data Privacy
, vol.1
, Issue.1
, pp. 2-16
-
-
Lane, J.1
Heus, P.2
Mulcahy, T.3
-
18
-
-
36048960434
-
Rethinking rank swapping to decrease disclosure risk
-
DOI 10.1016/j.datak.2007.07.006, PII S0169023X07001498, Fourth International Conference on Business Process Management (BPM 2006) Four selected and extended papers
-
Nin, J., Herranz, J., Torra, V.: Rethinking rank swapping to decrease disclosure risk. Data & Knowledge Engineering 64(1), 346-364 (2008) (Pubitemid 350087293)
-
(2008)
Data and Knowledge Engineering
, vol.64
, Issue.1
, pp. 346-364
-
-
Nin, J.1
Herranz, J.2
Torra, V.3
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
DOI 10.1007/11761679-31, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Schoenmakers, B., Tuyls, P.: Efficient binary conversion for Paillier encrypted values. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 522-537. Springer, Heidelberg (2006) (Pubitemid 44072259)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
|