-
1
-
-
77953131105
-
-
Advanced Encryption Standard (AES): NIST-Federal Information Processing Standards Publication 197, Nov (2001)
-
Advanced Encryption Standard (AES): NIST-Federal Information Processing Standards Publication 197, Nov (2001).
-
-
-
-
2
-
-
3142716056
-
Order-preserving encryption for numeric data
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: SIGMOD (2004).
-
(2004)
SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
3
-
-
0041783510
-
Privacy-preserving data mining
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD (2000).
-
(2000)
SIGMOD
-
-
Agrawal, R.1
Srikant, R.2
-
4
-
-
0039301636
-
A cost model for query processing in high-dimensional data spaces
-
Böhm C.: A cost model for query processing in high-dimensional data spaces. ACM TODS 25(2), 129-178 (2000).
-
(2000)
ACM TODS
, vol.25
, Issue.2
, pp. 129-178
-
-
Böhm, C.1
-
5
-
-
0036606530
-
A framework for generating network-based moving objects
-
Brinkhoff T.: A framework for generating network-based moving objects. GeoInformatica 6(2), 153-180 (2002).
-
(2002)
GeoInformatica
, vol.6
, Issue.2
, pp. 153-180
-
-
Brinkhoff, T.1
-
6
-
-
0015050308
-
Alternative algorithm for Hilbert's space-filling curve
-
Butz A. R.: Alternative algorithm for Hilbert's space-filling curve. IEEE Trans. Comput. C-20(4), 424-426 (1971).
-
(1971)
IEEE Trans. Comput.
, vol.C-20
, Issue.4
, pp. 424-426
-
-
Butz, A.R.1
-
7
-
-
52649097332
-
Authenticating multi-dimensional query results in data publishing
-
Cheng, W., Pang, H., Tan, K.-L.: Authenticating multi-dimensional query results in data publishing. In: DBSec (2006).
-
(2006)
DBSec
-
-
Cheng, W.1
Pang, H.2
Tan, K.-L.3
-
8
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Damiani, E., Vimercati, S. D. C., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: CCS (2003).
-
(2003)
CCS
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
9
-
-
0038274733
-
Authentic data publication over the Internet
-
Devanbu P., Gertz M., Martel C., Stubblebine S. G.: Authentic data publication over the Internet. J. Comput. Secur. 11(3), 291-314 (2003).
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.G.4
-
10
-
-
70349305273
-
Differential privacy: A survey of results
-
Dwork, C.: Differential privacy: a survey of results. In: TAMC, pp. 1-19 (2008).
-
(2008)
TAMC
, pp. 1-19
-
-
Dwork, C.1
-
11
-
-
27944454864
-
Location privacy in mobile systems: A personalized anonymization model
-
Gedik, B., Liu, L.: Location privacy in mobile systems: a personalized anonymization model. In: ICDCS (2005).
-
(2005)
ICDCS
-
-
Gedik, B.1
Liu, L.2
-
12
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K. L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD (2008).
-
(2008)
SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.L.5
-
13
-
-
84988315609
-
Fast data anonymization with low information loss
-
Ghinita, G., Karras, P., Kalnis, P., Mamoulis, N.: Fast data anonymization with low information loss. In: VLDB (2007).
-
(2007)
VLDB
-
-
Ghinita, G.1
Karras, P.2
Kalnis, P.3
Mamoulis, N.4
-
14
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
Goldreich O., Ostrovsky R.: Software protection and simulation on oblivious rams. J. ACM 43, 431-473 (1996).
-
(1996)
J. ACM
, vol.43
, pp. 431-473
-
-
Goldreich, O.1
Ostrovsky, R.2
-
15
-
-
1642286258
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: USENIX MobiSys (2003).
-
(2003)
USENIX MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
16
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Hacigümüs, H., Iyer, B. R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: SIGMOD (2002).
-
(2002)
SIGMOD
-
-
Hacigümüs, H.1
Iyer, B.R.2
Li, C.3
Mehrotra, S.4
-
18
-
-
0000701994
-
Distance browsing in spatial databases
-
Hjaltason G. R., Samet H.: Distance browsing in spatial databases. TODS 24(2), 265-318 (1999).
-
(1999)
Tods
, vol.24
, Issue.2
, pp. 265-318
-
-
Hjaltason, G.R.1
Samet, H.2
-
19
-
-
35648982949
-
Preventing location-based identity inference in anonymous spatial queries
-
Kalnis P., Ghinita G., Mouratidis K., Papadias D.: Preventing location-based identity inference in anonymous spatial queries. IEEE TKDE 19(12), 1719-1733 (2007).
-
(2007)
IEEE TKDE
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
20
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM (2003).
-
(2003)
ICDM
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
21
-
-
57149125534
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
Khoshgozaran, A., Shahabi, C.: Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy. In: SSTD (2007).
-
(2007)
SSTD
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
23
-
-
34548805858
-
-
t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE (2007)
-
Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE (2007).
-
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
24
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu K., Kargupta H., Ryan J.: Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE TKDE 18(1), 92-106 (2006).
-
(2006)
IEEE TKDE
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
25
-
-
33749607006
-
-
l-Diversity: privacy beyond k-anonymity. In: ICDE (2006)
-
Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-Diversity: privacy beyond k-anonymity. In: ICDE (2006).
-
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
26
-
-
77953135773
-
-
A certified digital signature. In: CRYPTO (1989)
-
Merkle, R. C.: A certified digital signature. In: CRYPTO (1989).
-
-
-
Merkle, R.C.1
-
27
-
-
77953138747
-
-
The new casper: query processing for location services without compromising privacy. In: VLDB (2006)
-
Mokbel, M. F., Chow, C.-Y., Aref, W. G.: The new casper: query processing for location services without compromising privacy. In: VLDB (2006).
-
-
-
Mokbel, M.F.1
Chow, C.-Y.2
Aref, W.G.3
-
28
-
-
84864173309
-
-
National Institute of Standards and Technology. Secure Hashing
-
National Institute of Standards and Technology. Secure Hashing. http://csrc. nist. gov/groups/ST/toolkit/secure_hashing. html.
-
-
-
-
29
-
-
85011095699
-
-
Time series compressibility and privacy. In: VLDB (2007)
-
Papadimitriou, S., Li, F., Kollios, G., Yu, P. S.: Time series compressibility and privacy. In: VLDB (2007).
-
-
-
Papadimitriou, S.1
Li, F.2
Kollios, G.3
Yu, P.S.4
-
30
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
Samarati P.: Protecting respondents' identities in microdata release. IEEE TKDE 13(6), 1010-1027 (2001).
-
(2001)
IEEE TKDE
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
31
-
-
0036445714
-
-
GPRS traffic performance measurements. In: IEEE Vehicular Technology Conference (2002)
-
Stuckmann, P., Ehlers, N., Wouters, B.: GPRS traffic performance measurements. In: IEEE Vehicular Technology Conference (2002).
-
-
-
Stuckmann, P.1
Ehlers, N.2
Wouters, B.3
-
32
-
-
0029706786
-
-
A model for the prediction of R-tree performance. In: PODS (1996)
-
Theodoridis, Y., Sellis, T. K.: A model for the prediction of R-tree performance. In: PODS (1996).
-
-
-
Theodoridis, Y.1
Sellis, T.K.2
-
33
-
-
77953137338
-
-
A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In: VLDB (1998)
-
Weber, R., Schek, H.-J., Blott, S.: A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In: VLDB (1998).
-
-
-
Weber, R.1
Schek, H.-J.2
Blott, S.3
-
34
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 139-148 (2008).
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 139-148
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
35
-
-
70849131456
-
-
Secure k-NN computation on encrypted databases. In: SIGMOD (2009)
-
Wong, W. K., Cheung, D. W., Kao, B., Mamoulis, N.: Secure k-NN computation on encrypted databases. In: SIGMOD (2009).
-
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
36
-
-
52649150749
-
-
Spatial outsourcing for location-based services. In: ICDE (2008)
-
Yang, Y., Papadopoulos, S., Papadias, D., Kollios, G.: Spatial outsourcing for location-based services. In: ICDE (2008).
-
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
-
37
-
-
67649651664
-
-
Outsourcing search services on private spatial data. In: ICDE (2009)
-
Yiu, M. L., Ghinita, G., Jensen, C. S., Kalnis, P.: Outsourcing search services on private spatial data. In: ICDE (2009).
-
-
-
Yiu, M.L.1
Ghinita, G.2
Jensen, C.S.3
Kalnis, P.4
-
38
-
-
52649118020
-
-
SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE (2008)
-
Yiu, M. L., Jensen, C. S., Huang, X., Lu, H.: SpaceTwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services. In: ICDE (2008).
-
-
-
Yiu, M.L.1
Jensen, C.S.2
Huang, X.3
Lu, H.4
|