-
1
-
-
33749642794
-
Sovereign joins
-
R. Agrawal, D. Asonov, M. Kantarcioglu, and Y. Li. Sovereign joins. In ICDE '06, page 26, 2006.
-
(2006)
ICDE '06
, pp. 26
-
-
Agrawal, R.1
Asonov, D.2
Kantarcioglu, M.3
Li, Y.4
-
4
-
-
77952259855
-
Blocking-aware private record linkage
-
A. Al-Lawati, D. Lee, and P. McDaniel. Blocking-aware private record linkage. In Proceedings of IQIS 2005, Baltimore, Maryland, 2005.
-
Proceedings of IQIS 2005, Baltimore, Maryland, 2005
-
-
Al-Lawati, A.1
Lee, D.2
McDaniel, P.3
-
5
-
-
0025447750
-
The R*-tree: An efficient and robust access method for points and rectangles
-
N. Beckmann, H.-P. Kriegel, R. Schneider, and B. Seeger. The R*-tree: an efficient and robust access method for points and rectangles. SIGMOD Rec., 19(2):322-331, 1990.
-
(1990)
SIGMOD Rec
, vol.19
, Issue.2
, pp. 322-331
-
-
Beckmann, N.1
Kriegel, H.-P.2
Schneider, R.3
Seeger, B.4
-
7
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Jan.
-
C. Clifton, M. Kantarcioǧlu, X. Lin, J. Vaidya, and M. Zhu. Tools for privacy preserving distributed data mining. SIGKDD Explorations, 4(2):28-34, Jan. 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioǧlu, M.2
Lin, X.3
Vaidya, J.4
Zhu, M.5
-
8
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP (2), pages 1-12, 2006.
-
(2006)
ICALP
, Issue.2
, pp. 1-12
-
-
Dwork, C.1
-
9
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. In TCC, pages 265-284, 2006.
-
(2006)
TCC
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekci, D. Agrawal, A. El Abbadi, and A. Gulbeden. Privacy preserving query processing using third parties. In Proceedings of ICDE 2006, Atlanta, GA, 2006.
-
Proceedings of ICDE 2006, Atlanta, GA, 2006
-
-
Emekci, F.1
Agrawal, D.2
El Abbadi, A.3
Gulbeden, A.4
-
13
-
-
12244263240
-
Efficient private matching and set intersection
-
May 2-6 2004
-
M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In Eurocrypt 2004, May 2-6 2004.
-
(2004)
Eurocrypt
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
14
-
-
0003979335
-
-
chapter General Cryptographic Protocols. Cambridge University Press
-
O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
16
-
-
52649087713
-
A hybrid approach to private record linkage
-
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco. A hybrid approach to private record linkage. In ICDE '08, pages 496-505, 2008.
-
(2008)
ICDE '08
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
20
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In Proc. of ICDE 2007, pages 106-115.
-
Proc. of ICDE 2007
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
21
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam. l-diversity: Privacy beyond k-anonymity. ICDE 2006, page 24, 2006.
-
(2006)
ICDE 2006
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
22
-
-
35448932873
-
Privacy preserving schema and data matching
-
M. Scannapieco, I. Figotin, E. Bertino, and A. Elmagarmid. Privacy preserving schema and data matching. In SIGMOD, page 653, 2007.
-
(2007)
SIGMOD
, pp. 653
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.4
-
24
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Nov
-
J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4), Nov. 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
-
-
Vaidya, J.1
Clifton, C.2
-
25
-
-
70849091169
-
Output perturbation with query relaxation
-
X. Xiao and Y. Tao. Output perturbation with query relaxation. PVLDB, 1(1):857-869, 2008.
-
(2008)
PVLDB
, vol.1
, Issue.1
, pp. 857-869
-
-
Xiao, X.1
Tao, Y.2
|