메뉴 건너뛰기




Volumn 6205 LNCS, Issue , 2010, Pages 56-74

Collaborative, privacy-preserving data aggregation at scale

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL RESOURCES; CRYPTOGRAPHIC PROTOCOLS; DATA AGGREGATION; EVALUATION FUNCTION; IP ADDRESSS; MALICIOUS ATTACK; PRACTICAL SOLUTIONS; PRIVACY PRESERVING; PROTOTYPE IMPLEMENTATIONS;

EID: 77955452807     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14527-8_4     Document Type: Conference Paper
Times cited : (33)

References (42)
  • 1
    • 77955432909 scopus 로고    scopus 로고
    • Alexa the Web Information Company
    • Alexa the Web Information Company (2010), http://www.alexa.com/
    • (2010)
  • 2
    • 72849124827 scopus 로고    scopus 로고
    • Fighting coordinated attackers with crossorganizational information sharing
    • November
    • Allman, M., Blanton, E., Paxson, V., Shenker, S.: Fighting coordinated attackers with crossorganizational information sharing. In: HotNets (November 2006)
    • (2006) HotNets
    • Allman, M.1    Blanton, E.2    Paxson, V.3    Shenker, S.4
  • 3
    • 70349266254 scopus 로고    scopus 로고
    • FairplayMP: A system for secure multi-party computation
    • October
    • Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: A system for secure multi-party computation. In: CCS (October 2008)
    • (2008) CCS
    • Ben-David, A.1    Nisan, N.2    Pinkas, B.3
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: STOC (1988)
    • (1988) STOC
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 6
    • 85065181066 scopus 로고    scopus 로고
    • The Chubby lock service for loosely-coupled distributed systems
    • November
    • Burrows, M.: The Chubby lock service for loosely-coupled distributed systems. In: OSDI (November 2006)
    • (2006) OSDI
    • Burrows, M.1
  • 7
    • 84937453032 scopus 로고
    • Multiparty unconditionally secure protocols
    • Pomerance, C. ed., Springer, Heidelberg
    • Chaum, D., Crépeau, C., Damgård, I. B.: Multiparty unconditionally secure protocols. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 462-462. Springer, Heidelberg (1988)
    • (1988) CRYPTO 1987. LNCS , vol.293 , pp. 462-462
    • Chaum, D.1    Crépeau, C.2    Damgård, I.B.3
  • 9
    • 70350347974 scopus 로고    scopus 로고
    • On the amortized complexity of zero-knowledge protocols
    • Halevi, S. ed., Springer, Heidelberg
    • Cramer, R., Damgård, I.: On the amortized complexity of zero-knowledge protocols. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 177-191. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 177-191
    • Cramer, R.1    Damgård, I.2
  • 10
    • 68949136946 scopus 로고    scopus 로고
    • Efficient robust private set intersection
    • Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. eds., Springer, Heidelberg
    • Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 125-142. Springer, Heidelberg (2009)
    • (2009) ACNS 2009. LNCS , vol.5536 , pp. 125-142
    • Dachman-Soled, D.1    Malkin, T.2    Raykova, M.3    Yung, M.4
  • 12
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Druschel, P., Kaashoek, M. F., Rowstron, A. eds., Springer, Heidelberg
    • Douceur, J. R.: The Sybil attack. In: Druschel, P., Kaashoek, M. F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
    • (2002) IPTPS 2002. LNCS , vol.2429 , pp. 251
    • Douceur, J.R.1
  • 13
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Fagin, R., Naor, M., Winkler, P.: Comparing information without leaking it. Comm. ACM 39 (5) (1996)
    • (1996) Comm. ACM , vol.39 , Issue.5
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 14
    • 77955450867 scopus 로고    scopus 로고
    • Fair exchange with a semi-trusted third party (extended abstract)
    • April
    • Franklin, M. K., Reiter, M. K.: Fair exchange with a semi-trusted third party (extended abstract). In: CCS (April 1997)
    • (1997) CCS
    • Franklin, M.K.1    Reiter, M.K.2
  • 15
    • 24144488603 scopus 로고    scopus 로고
    • Keyword search and oblivious pseudorandom functions
    • Kilian, J. ed., Springer, Heidelberg
    • Freedman, M. J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303-324. Springer, Heidelberg (2005)
    • (2005) TCC 2005. LNCS , vol.3378 , pp. 303-324
    • Freedman, M.J.1    Ishai, Y.2    Pinkas, B.3    Reingold, O.4
  • 16
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J. L. eds., Springer, Heidelberg
    • Freedman, M. J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J. L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) EUROCRYPT 2004. LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 17
    • 77955463508 scopus 로고    scopus 로고
    • Friend-of-a-Friend Project
    • Friend-of-a-Friend Project (2009), http://www.foaf-project.org/
    • (2009)
  • 20
    • 0002337124 scopus 로고
    • How to play any mental game (extended abstract)
    • May
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game (extended abstract). In: STOC (May 1987)
    • (1987) STOC
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 23
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. ed., Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) TCC 2008. LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 24
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. ed., Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 26
    • 33745160750 scopus 로고    scopus 로고
    • Privacy preserving set operations
    • Shoup, V. ed., Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 27
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Bellare, M. ed. Springer, Heidelberg
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, p. 36. Springer, Heidelberg (2000)
    • (2000) CRYPTO 2000. LNCS , vol.1880 , pp. 36
    • Lindell, Y.1    Pinkas, B.2
  • 30
    • 0003147279 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • May
    • Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation. In: STOC (May 1999)
    • (1999) STOC
    • Naor, M.1    Pinkas, B.2
  • 31
    • 84957096920 scopus 로고    scopus 로고
    • Oblivious transfer with adaptive queries
    • Wiener, M. ed., Springer, Heidelberg
    • Naor, M., Pinkas, B.: Oblivious transfer with adaptive queries. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 573. Springer, Heidelberg (1999)
    • (1999) CRYPTO 1999. LNCS , vol.1666 , pp. 573
    • Naor, M.1    Pinkas, B.2
  • 32
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • January
    • Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA (January 2001)
    • (2001) SODA
    • Naor, M.1    Pinkas, B.2
  • 33
    • 0031332843 scopus 로고    scopus 로고
    • Number-theoretic constructions of efficient pseudorandom functions
    • October
    • Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudorandom functions. In: FOCS (October 1997)
    • (1997) FOCS
    • Naor, M.1    Reingold, O.2
  • 34
    • 36949017412 scopus 로고    scopus 로고
    • ConfiDNS: Leveraging scale and history to improve DNS security
    • November
    • Poole, L., Pai, V. S.: ConfiDNS: Leveraging scale and history to improve DNS security. In: WORLDS (November 2006)
    • (2006) WORLDS
    • Poole, L.1    Pai, V.S.2
  • 35
    • 33845572567 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse. January
    • Privacy Rights Clearinghouse. A chronology of data breaches (January 2009), http://www.privacyrights.org/ar/ChronDataBreaches.htm
    • (2009) A Chronology of Data Breaches
  • 36
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • Harvard Aiken Computation Lab
    • Rabin, M.: How to exchange secrets by oblivious transfer. Tech. Rep. TR-81, Harvard Aiken Computation Lab. (1981)
    • (1981) Tech. Rep. TR-81
    • Rabin, M.1
  • 37
    • 85000701895 scopus 로고    scopus 로고
    • My botnet is bigger than yours (maybe, better than yours) : Why size estimates remain challenging
    • April
    • Rajab, M. A., Zarfoss, J., Monrose, F., Terzis, A.: My botnet is bigger than yours (maybe, better than yours) : Why size estimates remain challenging. In: HotBots (April 2007)
    • (2007) HotBots
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 38
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • September
    • Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: SIGCOMM (September 2006)
    • (2006) SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 40
    • 39049090038 scopus 로고    scopus 로고
    • Inoculating SSH against address harvesting
    • Feburary
    • Schechter, S., Jung, J., Stockwell, W., McLain, C.: Inoculating SSH against address harvesting. In: NDSS (Feburary 2006)
    • (2006) NDSS
    • Schechter, S.1    Jung, J.2    Stockwell, W.3    McLain, C.4
  • 41
    • 85034040740 scopus 로고    scopus 로고
    • Perspectives: Improving SSH-style host authentication with multi-path probing
    • June
    • Wendlandt, D., Andersen, D. G., Perrig, A.: Perspectives: Improving SSH-style host authentication with multi-path probing. In: USENIX Technical (June 2008)
    • (2008) USENIX Technical
    • Wendlandt, D.1    Andersen, D.G.2    Perrig, A.3
  • 42
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • November
    • Yao, A. C.: Protocols for secure computations. In: FOCS (November 1982)
    • (1982) FOCS
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.