-
1
-
-
78650959335
-
-
Anonymizer, Inc. http://www.anonymizer.com.
-
-
-
-
2
-
-
78650950658
-
-
Shadowsurf. http://www.shadowsurf.com/.
-
-
-
-
4
-
-
84958639277
-
Efficient generation of shared RSA keys
-
D. Boneh and M. K. Franklin. Efficient generation of shared RSA keys. In CRYPTO'97, pages 425-439, 1997.
-
(1997)
CRYPTO'97
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.K.2
-
5
-
-
74049103179
-
Secure two-party k-means clustering
-
P. Bunn and R. Ostrovsky. Secure two-party k-means clustering. In CCS'07, pages 486-497, 2007.
-
(2007)
CCS'07
, pp. 486-497
-
-
Bunn, P.1
Ostrovsky, R.2
-
6
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
R. Canetti. Security and composition of multiparty cryptographic protocols. Journal of Cryptology, 13(1):143-202, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
7
-
-
0036082701
-
Collaborative filtering with privacy
-
J. F. Canny. Collaborative filtering with privacy. In SSP'02, pages 45-57, 2002.
-
(2002)
SSP'02
, pp. 45-57
-
-
Canny, J.F.1
-
8
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR'02, pages 238-245, 2002.
-
(2002)
SIGIR'02
, pp. 238-245
-
-
Canny, J.F.1
-
10
-
-
84876544258
-
Preventing shilling attacks in online recommender systems
-
P.-A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In WIDM'05, pages 67-74, 2005.
-
(2005)
WIDM'05
, pp. 67-74
-
-
Chirita, P.-A.1
Nejdl, W.2
Zamfir, C.3
-
11
-
-
84867553981
-
A generalisation, a simplification and some applications of Paillier's probabilistic public-key system
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In PKC'01, pages 119-136, 2001.
-
(2001)
PKC'01
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
12
-
-
84945127249
-
Practical threshold RSA signatures without a trusted dealer
-
I. Damgård and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In EUROCRYPT'01, pages 152-165, 2001.
-
(2001)
EUROCRYPT'01
, pp. 152-165
-
-
Damgård, I.1
Koprowski, M.2
-
13
-
-
0003956839
-
-
Version 1.0. RFC 2246 (Proposed Standard), Jan.
-
T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), Jan. 1999.
-
(1999)
The TLS Protocol
-
-
Dierks, T.1
Allen, C.2
-
16
-
-
33746335051
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP'06, pages 1-12, 2006.
-
(2006)
ICALP'06
, pp. 1-12
-
-
Dwork, C.1
-
17
-
-
70349305273
-
Differential privacy: A survey of results
-
C. Dwork. Differential privacy: A survey of results. In TAMC'08, pages 1-19, 2008.
-
(2008)
TAMC'08
, pp. 1-19
-
-
Dwork, C.1
-
18
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
P.-A. Fouque, G. Poupard, and J. Stern. Sharing decryption in the context of voting or lotteries. In FC'00, pages 90-104, 2000.
-
(2000)
FC'00
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
19
-
-
78649306526
-
-
Technical Report 2010-05, Department of CSE, University of Notre Dame
-
T. R. Hoens, M. Blanton, and N. Chawla. A private and reliable recommendation system using a social network. Technical Report 2010-05, Department of CSE, University of Notre Dame, 2010.
-
(2010)
A Private and Reliable Recommendation System Using a Social Network
-
-
Hoens, T.R.1
Blanton, M.2
Chawla, N.3
-
20
-
-
70350656351
-
TrustWalker: A random walk model for combining trust-based and item-based recommendation
-
M. Jamali and M. Ester. TrustWalker: a random walk model for combining trust-based and item-based recommendation. In KDD'09, pages 397-406, 2009.
-
(2009)
KDD'09
, pp. 397-406
-
-
Jamali, M.1
Ester, M.2
-
21
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In ICDM'03, pages 99-106, 2003.
-
(2003)
ICDM'03
, pp. 99-106
-
-
Kargupta, H.1
Datta, S.2
Wang, Q.3
Sivakumar, K.4
-
22
-
-
49049091204
-
Privacy-preserving recommendation systems for consumer healthcare services
-
S. Katzenbeisser and M. Petkovic. Privacy-preserving recommendation systems for consumer healthcare services. In ARES'08, pages 889-895, 2008.
-
(2008)
ARES'08
, pp. 889-895
-
-
Katzenbeisser, S.1
Petkovic, M.2
-
23
-
-
19944368437
-
Shilling recommender systems for fun and profit
-
S. K. Lam. and J. Riedl. Shilling recommender systems for fun and profit. In WWW'04, pages 393-402, 2004.
-
(2004)
WWW'04
, pp. 393-402
-
-
Lam, S.K.1
Riedl, J.2
-
24
-
-
32844472646
-
Trust-aware collaborative filtering for recommender systems
-
P. Massa and P. Avesani. Trust-aware collaborative filtering for recommender systems. In CoopIS'04, pages 492-508, 2004.
-
(2004)
CoopIS'04
, pp. 492-508
-
-
Massa, P.1
Avesani, P.2
-
25
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the Netflix prize contenders
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In KDD'09, pages 627-636, 2009.
-
(2009)
KDD'09
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
26
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT'99, pages 223-238, 1999.
-
(1999)
EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
H. Polat and W. Du. SVD-based collaborative filtering with privacy. In SAC'05, pages 791-795, 2005.
-
(2005)
SAC'05
, pp. 791-795
-
-
Polat, H.1
Du, W.2
-
28
-
-
33746092442
-
Efficient binary conversion for Paillier encrypted values
-
B. Schoenmakers and P. Tuyls. Efficient binary conversion for Paillier encrypted values. In EUROCRYPT'06, pages 522-537, 2006.
-
(2006)
EUROCRYPT'06
, pp. 522-537
-
-
Schoenmakers, B.1
Tuyls, P.2
-
29
-
-
33748679129
-
A privacy-preserving collaborative filtering scheme with two-way communication
-
S. Zhang, J. Ford, and F. Makedon. A privacy-preserving collaborative filtering scheme with two-way communication. In EC'06, pages 316-323, 2006.
-
(2006)
EC'06
, pp. 316-323
-
-
Zhang, S.1
Ford, J.2
Makedon, F.3
|