-
1
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
M. Atallah, M. Bykova, J. Li, K. Frikken, and M. Topkara, "Private collaborative forecasting and benchmarking," in ACM Workshop on Privacy in the Electronic Society (WPES), 2004, pp. 103-114.
-
ACM Workshop on Privacy in the Electronic Society (WPES), 2004
, pp. 103-114
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
3
-
-
76549136227
-
-
Department of Computer Science and Engineering, University of Notre Dame, Tech. Rep. 2009-03
-
M. Blanton and M. Aliasgari, "Secure computation of biometric matching," Department of Computer Science and Engineering, University of Notre Dame, Tech. Rep. 2009-03, 2009.
-
(2009)
Secure Computation of Biometric Matching
-
-
Blanton, M.1
Aliasgari, M.2
-
4
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology - EUROCRYPT
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Advances in Cryptology - EUROCRYPT, ser. LNCS, vol. 1592, 1999, pp. 223-238.
-
(1999)
Ser. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
5
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
International Conference on Financial Cryptography (FC)
-
P.-A. Fouque, G. Poupard, and J. Stern, "Sharing decryption in the context of voting or lotteries," in International Conference on Financial Cryptography (FC), ser. LNCS, vol. 1962, 2000, pp. 90-104.
-
(2000)
Ser. LNCS
, vol.1962
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
6
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damg̊ard and M. Jurik, "A generalisation, a simplification and some applications of Paillier's probabilistic public-key system," in International Workshop on Practice and Theory in Public Key Cryptography (PKC), 2001, pp. 119-136.
-
International Workshop on Practice and Theory in Public Key Cryptography (PKC), 2001
, pp. 119-136
-
-
Damg̊ard, I.1
Jurik, M.2
-
7
-
-
4243114091
-
Efficient generation of shared RSA keys
-
D. Boneh and M. Franklin, "Efficient generation of shared RSA keys," Journal of the ACM, vol. 48, no. 4, pp. 702-722, 2001.
-
(2001)
Journal of the ACM
, vol.48
, Issue.4
, pp. 702-722
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
84945127249
-
Practical threshold RSA signatures without a trusted dealer
-
Advances in Cryptology - EUROCRYPT
-
I. Damg̊ard and M. Koprowski, "Practical threshold RSA signatures without a trusted dealer," in Advances in Cryptology - EUROCRYPT, ser. LNCS, vol. 2045, 2001, pp. 152-165.
-
(2001)
Ser. LNCS
, vol.2045
, pp. 152-165
-
-
Damg̊ard, I.1
Koprowski, M.2
-
9
-
-
78649306526
-
-
Department of Computer Science and Engineering, University of Notre Dame, Tech. Rep. 2010-05
-
T. R. Hoens, M. Blanton, and N. Chawla, "A private and reliable recommendation system using a social network," Department of Computer Science and Engineering, University of Notre Dame, Tech. Rep. 2010-05, 2010.
-
(2010)
A Private and Reliable Recommendation System Using a Social Network
-
-
Hoens, T.R.1
Blanton, M.2
Chawla, N.3
-
10
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
Advances in Cryptology - EUROCRYPT
-
B. Schoenmakers and P. Tuyls, "Efficient binary conversion for Paillier encrypted values," in Advances in Cryptology - EUROCRYPT, ser. LNCS, vol. 4004, 2006, pp. 522-537.
-
(2006)
Ser. LNCS
, vol.4004
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
11
-
-
50049126374
-
Experimenting with shared generation of RSA keys
-
M. Malkin, T. Wu, and D. Boneh, "Experimenting with shared generation of RSA keys," in Symposium on Network and Distributed System Security (NDSS), 1999, pp. 43-56.
-
Symposium on Network and Distributed System Security (NDSS), 1999
, pp. 43-56
-
-
Malkin, M.1
Wu, T.2
Boneh, D.3
-
12
-
-
0031628726
-
Robust efficient distributed RSA-key generation
-
Y. Frankel, P. MacKenzie, and M. Yung, "Robust efficient distributed RSA-key generation," in ACM Symposium on Theory of Computing (STOC), 1998, pp. 663-672.
-
ACM Symposium on Theory of Computing (STOC), 1998
, pp. 663-672
-
-
Frankel, Y.1
MacKenzie, P.2
Yung, M.3
-
13
-
-
79957931151
-
Eliminating quadratic slowdown in two-prime RSA function sharing
-
M. Ibrahim, "Eliminating quadratic slowdown in two-prime RSA function sharing," International Journal of Network Security (IJNS), vol. 7, no. 1, pp. 106-113, 2008.
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.1
, pp. 106-113
-
-
Ibrahim, M.1
-
15
-
-
77949590096
-
Efficient, robust and constant-round distributed RSA key generation
-
I. Damg̊ard and G. Mikkelsen, "Efficient, robust and constant-round distributed RSA key generation," in Theory of Cryptography Conference (TCC), 2010, pp. 183-200.
-
Theory of Cryptography Conference (TCC), 2010
, pp. 183-200
-
-
Damg̊ard, I.1
Mikkelsen, G.2
-
18
-
-
32844472646
-
Trust-aware collaborative filtering for recommender systems
-
International Conference on Cooperative Information Systems (CoopIS)
-
P. Massa and P. Avesani, "Trust-aware collaborative filtering for recommender systems," in International Conference on Cooperative Information Systems (CoopIS), ser. LNCS, vol. 3290, 2004, pp. 492-508.
-
(2004)
Ser. LNCS
, vol.3290
, pp. 492-508
-
-
Massa, P.1
Avesani, P.2
-
19
-
-
56349084089
-
TREPPS: A trust-based recommender system for peer production services
-
Y.-M. Li and C.-P. Kao, "TREPPS: A trust-based recommender system for peer production services," Expert Systems with Applications (ESWA), vol. 36, no. 2, pp. 3263-3277, 2009.
-
(2009)
Expert Systems with Applications (ESWA)
, vol.36
, Issue.2
, pp. 3263-3277
-
-
Li, Y.-M.1
Kao, C.-P.2
-
20
-
-
76549121147
-
A user trust-based collaborative filtering recommendation algorithm
-
F. Zhang, L. Bai, and F. Gao, "A user trust-based collaborative filtering recommendation algorithm," in International Conference on Information and Communications Security (ICICS), 2009, pp. 411-424.
-
International Conference on Information and Communications Security (ICICS), 2009
, pp. 411-424
-
-
Zhang, F.1
Bai, L.2
Gao, F.3
-
21
-
-
49049091204
-
Privacy-preserving recommendation systems for consumer healthcare services
-
S. Katzenbeisser and M. Petkovic, "Privacy-preserving recommendation systems for consumer healthcare services," in International Conference on Availability, Reliability and Security (ARES), 2008, pp. 889-895.
-
International Conference on Availability, Reliability and Security (ARES), 2008
, pp. 889-895
-
-
Katzenbeisser, S.1
Petkovic, M.2
-
26
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar, "On the privacy preserving properties of random data perturbation techniques," in IEEE International Conference on Data Mining (ICDM), 2003, pp. 99-106.
-
IEEE International Conference on Data Mining (ICDM), 2003
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
27
-
-
33748679129
-
A privacy-preserving collaborative filtering scheme with two-way communication
-
S. Zhang, J. Ford, and F. Makedon, "A privacy-preserving collaborative filtering scheme with two-way communication," in ACM Conference on Electronic Commerce (EC), 2006, pp. 316-323.
-
ACM Conference on Electronic Commerce (EC), 2006
, pp. 316-323
-
-
Zhang, S.1
Ford, J.2
Makedon, F.3
-
28
-
-
50249104379
-
Privacy-aware collaborative access control in web-based social networks
-
IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec)
-
B. Carminati and E. Ferrari, "Privacy-aware collaborative access control in web-based social networks," in IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec), ser. LNCS, vol. 5094, 2008, pp. 81-96.
-
(2008)
Ser. LNCS
, vol.5094
, pp. 81-96
-
-
Carminati, B.1
Ferrari, E.2
-
29
-
-
37249047452
-
A public-key protocol for social networks with private relationships
-
Modeling Decisions for Artifical Intelligence (MDAI)
-
J. Domingo-Ferrer, "A public-key protocol for social networks with private relationships," in Modeling Decisions for Artifical Intelligence (MDAI), ser. LNCS, vol. 4617, 2007, pp. 373-379.
-
(2007)
Ser. LNCS
, vol.4617
, pp. 373-379
-
-
Domingo-Ferrer, J.1
-
31
-
-
52049126397
-
Privacy homomorphisms for social networks with private relationships
-
J. Domingo-Ferrer, A. Viejo, F. Sebe, and U. Gonzalez-Nicolas, "Privacy homomorphisms for social networks with private relationships," Computer Networks (CN), vol. 52, no. 15, pp. 3007-3016, 2008.
-
(2008)
Computer Networks (CN)
, vol.52
, Issue.15
, pp. 3007-3016
-
-
Domingo-Ferrer, J.1
Viejo, A.2
Sebe, F.3
Gonzalez-Nicolas, U.4
-
33
-
-
33746335051
-
Differential privacy
-
International Colloquium on Automata, Languages and Programming (ICALP)
-
C. Dwork, "Differential privacy," in International Colloquium on Automata, Languages and Programming (ICALP), ser. LNCS, vol. 4052, 2006, pp. 1-12.
-
(2006)
Ser. LNCS
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
34
-
-
70349305273
-
Differential privacy: A survey of results
-
International Conference on Theory and Applications of Models of Computation (TAMC)
-
-, "Differential privacy: A survey of results," in International Conference on Theory and Applications of Models of Computation (TAMC), ser. LNCS, vol. 4978, 2008, pp. 1-19.
-
(2008)
Ser. LNCS
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
37
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider, "Improved garbled circuit building blocks and applications to auctions and computing minima," in Cryptology and Network Security (CANS), 2009, pp. 1-20.
-
(2009)
Cryptology and Network Security (CANS)
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
39
-
-
84883898504
-
Privacy preserving auctions and mechanism design
-
M. Naor, B. Pinkas, and R. Sumner, "Privacy preserving auctions and mechanism design," in ACM Conference on Electronic Commerce (EC), 1999, pp. 129-139.
-
(1999)
ACM Conference on Electronic Commerce (EC)
, pp. 129-139
-
-
Naor, M.1
Pinkas, B.2
Sumner, R.3
-
40
-
-
84898960610
-
Completeness theorems for non-cryptographic fault tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Widgerson, "Completeness theorems for non-cryptographic fault tolerant distributed computation," in ACM Symposium on Theory of Computing (STOC), 1988, pp. 1-10.
-
ACM Symposium on Theory of Computing (STOC), 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Widgerson, A.3
|