메뉴 건너뛰기




Volumn 19, Issue 4, 2010, Pages 457-475

Efficient privacy-preserving similar document detection

Author keywords

Information retrieval; Privacy

Indexed keywords

BASE PROTOCOLS; COPYRIGHT PROTECTION ,; COSINE SIMILARITY; DOCUMENT SETS; FILE MANAGEMENT; MULTIPLE SERVERS; PRIVACY PRESERVING; RUNNING TIME; SECURE MULTI-PARTY COMPUTATION; SIMILARITY MEASURE; STATE-OF-THE ART PROTOCOLS;

EID: 77955176662     PISSN: 10668888     EISSN: 0949877X     Source Type: Journal    
DOI: 10.1007/s00778-009-0175-9     Document Type: Article
Times cited : (69)

References (30)
  • 1
    • 0023408117 scopus 로고
    • Processing encrypted data
    • doi:10.1145/30401.30404
    • Ahituv N., Lapid Y., Neumann S.: Processing encrypted data. Comm. ACM 20(9), 777-780 (1987). doi: 10. 1145/30401. 30404.
    • (1987) Comm. ACM , vol.20 , Issue.9 , pp. 777-780
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 3
    • 33750314850 scopus 로고    scopus 로고
    • Bernstein, Y., Shokouhi, M., Zobel, J.: Compact features for detection of near-duplicates in distributed retrieval. In: SPIRE, Glasgow, UK, pp. 110-121, Oct 11-13, 2006.
  • 4
    • 85198677809 scopus 로고    scopus 로고
    • Brin, S., Davis, J., Garcia-Molina, H.: Copy detection mechanisms for digital documents. In: Proceedings of the 1995 ACM SIGMOD Conference on Management of Data, pp. 398-409. ACM, San Jose (1995).
  • 5
    • 0031346696 scopus 로고    scopus 로고
    • Broder, A. Z.: On the resemblance and containment of documents. In: Compression and Complexity of Sequences, pp. 21-29 (1997).
  • 6
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • doi:10.1145/293347.293350
    • Chor B., Kushilevitz E., Goldreich O., Sudan M.: Private information retrieval. JACM 45(6), 965-981 (1998). doi: 10. 1145/293347. 293350.
    • (1998) Jacm , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 9
    • 77955176442 scopus 로고    scopus 로고
    • A document comparison scheme for secure duplicate detection
    • Federica M., Riccardo M., Paolo T.: A document comparison scheme for secure duplicate detection. Int. J. Digit. Libr. 4(3), 223-244 (2004).
    • (2004) Int. J. Digit. Libr. , vol.4 , Issue.3 , pp. 223-244
    • Federica, M.1    Riccardo, M.2    Paolo, T.3
  • 12
    • 77955172524 scopus 로고    scopus 로고
    • Goethals, B., Laur, S., Lipmaa, H., Mielikainen, T.: On secure scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), Seoul, Korea, pp. 104-120, Dec 2-3, 2004.
  • 13
    • 33645593031 scopus 로고    scopus 로고
    • The Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: The Foundations of Cryptography. In: General Cryptographic Protocols, vol. 2. Cambridge University Press, Cambridge. http://www. wisdom. weizmann. ac. il/oded/PSBookFrag/prot. ps (2004).
    • (2004) General Cryptographic Protocols , vol.2
    • Goldreich, O.1
  • 14
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on Theory of Computing, New York, NY, USA, pp. 218-229 (1987).
  • 16
    • 0021941417 scopus 로고    scopus 로고
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. In: Proceedings of the 17th Annual ACM Symposium on Theory of Computing (STOC'85), Providence, Rhode Island, USA, pp. 291-304, May 6-8, 1985.
  • 17
    • 0036361105 scopus 로고    scopus 로고
    • Hacigumus, H., Iyer, B. R., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, pp. 216-227, June 4-6, 2002. doi: 10. 1145/564691. 564717.
  • 18
    • 84873534197 scopus 로고    scopus 로고
    • Hersh, W., Cohen, A. M., Roberts, P., Rekapalli, H. K.: TREC 2006 genomics track overview. In: TREC Notebook, NIST (2006).
  • 19
    • 84864164261 scopus 로고    scopus 로고
    • Lemur toolkit for language modeling and information retrieval
    • Lemur toolkit for language modeling and information retrieval: http://www. lemurproject. org/.
  • 20
    • 4243443776 scopus 로고
    • Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33
    • Manber, U.: Finding similar files in a large file system. Department of Computer Science, The University of Arizona, Tucson, Arizona, Tech. Rep. TR 93-33. ftp://ftp. cs. arizona. edu/reports/1993/TR93-33. pdf (1993).
    • (1993) Finding similar files in a large file system
    • Manber, U.1
  • 21
    • 84942550998 scopus 로고    scopus 로고
    • Paillier, P.: Public key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology-Eurocrypt '99 Proceedings. Lecture Notes in Computer Science, vol. 1592, pp. 223-238, Prague, Czech Republic, May 2-6, 1999.
  • 22
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig S. C., Hellman M. E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory IT 24, 106-110 (1978).
    • (1978) IEEE Trans. Inform. Theory IT , vol.24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 23
    • 1142267351 scopus 로고    scopus 로고
    • Schleimer, S., Wilkerson, D. S., Aiken, A.: Winnowing: Local algorithms for document fingerprinting. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 76-85, June 9-12, 2003. ACM, San Diego (2003).
  • 24
    • 77955176371 scopus 로고    scopus 로고
    • Shivakumar, N., Garcia-Molina, H.: SCAM: a copy detection mechanism for digital documents. In: Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95), Austin, Texas, USA, June 11-13, 1995.
  • 25
    • 0029696087 scopus 로고    scopus 로고
    • Shivakumar, N., Garcia-Molina, H.: Building a scalable and accurate copy detection mechanism. In: Proceedings of the First ACM International Conference on Digital libraries, Bethesda, MD, USA, pp. 160-168, Mar 20-23, 1996.
  • 26
    • 84892758238 scopus 로고    scopus 로고
    • Si, A., Leong, H. V., Lau, R.: CHECK: a document plagiarism detection system. In: Proceedings of ACM Symposium for Applied Computing, pp. 70-77. ACM, San Jose (1997).
  • 27
    • 79959990623 scopus 로고    scopus 로고
    • Sorokina, D., Gehrke, J., Warner, S., Ginsparg, P.: Plagiarism detection in arXiv. In: Sixth IEEE International Conference on Data Mining (ICDM06), Hong Kong, China, pp. 1070-1075, Dec 18-12, 2006.
  • 28
    • 0242709355 scopus 로고    scopus 로고
    • Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, pp. 639-644, July 23-26, 2002. doi: 10. 1145/775047. 775142.
  • 29
    • 33750311279 scopus 로고    scopus 로고
    • Yang, H., Callan, J.: Near-duplicate detection by instance-level constrained clustering. In: Proceedings of the 29rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Seattle, WA, USA, pp. 421-428, Aug 6-11, 2006.
  • 30
    • 0022882770 scopus 로고    scopus 로고
    • Yao, A. C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162-167. IEEE, New York (1986).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.