메뉴 건너뛰기




Volumn , Issue , 2010, Pages 123-134

Private record matching using differential privacy

Author keywords

Differential privacy; Privacy; Record matching; Security

Indexed keywords

ALTERNATIVE DESIGNS; DATA INDEXING STRUCTURES; DATA SETS; DISTANCE BASED MATCHING; DISTANCE FUNCTIONS; K-ANONYMITY; K-D TREE; NEW MODEL; REAL-WORLD; SANITIZATION; SECURE MULTI-PARTY COMPUTATION; STATISTICAL QUERIES; SUB-SETS;

EID: 77952279809     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1739041.1739059     Document Type: Conference Paper
Times cited : (140)

References (25)
  • 5
    • 0025447750 scopus 로고
    • The R*-tree: An efficient and robust access method for points and rectangles
    • N. Beckmann, H.-P. Kriegel, R. Schneider, and B. Seeger. The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD Rec., 19(2):322-331, 1990.
    • (1990) SIGMOD Rec , vol.19 , Issue.2 , pp. 322-331
    • Beckmann, N.1    Kriegel, H.-P.2    Schneider, R.3    Seeger, B.4
  • 8
    • 33746335051 scopus 로고    scopus 로고
    • Differential privacy
    • C. Dwork. Differential privacy. In ICALP (2), pages 1-12, 2006.
    • (2006) ICALP , Issue.2 , pp. 1-12
    • Dwork, C.1
  • 9
    • 33745556605 scopus 로고    scopus 로고
    • Calibrating noise to sensitivity in private data analysis
    • C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
    • (2006) TCC , pp. 265-284
    • Dwork, C.1    McSherry, F.2    Nissim, K.3    Smith, A.4
  • 13
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • May 2-6 2004
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Eurocrypt 2004, May 2-6 2004.
    • (2004) Eurocrypt
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 14
    • 0003979335 scopus 로고    scopus 로고
    • chapter General Cryptographic Protocols. Cambridge University Press
    • O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 19
  • 20
    • 34548805858 scopus 로고    scopus 로고
    • T-closeness: Privacy beyond k-anonymity and l-diversity
    • N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. of ICDE 2007, pages 106-115.
    • Proc. of ICDE 2007 , pp. 106-115
    • Li, N.1    Li, T.2    Venkatasubramanian, S.3
  • 24
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Nov
    • J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4), Nov. 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.4
    • Vaidya, J.1    Clifton, C.2
  • 25
    • 70849091169 scopus 로고    scopus 로고
    • Output perturbation with query relaxation
    • X. Xiao and Y. Tao. Output perturbation with query relaxation. PVLDB, 1(1):857-869, 2008.
    • (2008) PVLDB , vol.1 , Issue.1 , pp. 857-869
    • Xiao, X.1    Tao, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.