-
2
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
Theory of Cryptography - Second Theory of Cryptography Conference, TCC 2005
-
Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325-341. Springer, Heidelberg (2005) (Pubitemid 41231172)
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-341
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
3
-
-
33845667955
-
Duplicate record detection: A survey
-
DOI 10.1109/TKDE.2007.250581
-
Elmagarmid, A.K., Ipeirotis, P.G., Verykios, V.S.: Duplicate record detection: A survey. IEEE TKDE, 19, 1-16 (2007) (Pubitemid 44955773)
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.1
, pp. 1-16
-
-
Elmagarmid, A.K.1
Ipeirotis, P.G.2
Verykios, V.S.3
-
4
-
-
35048820609
-
Efficient private matching and set intersection
-
Cachin, C., Camenisch, J.L. (eds.) Springer, Heidelberg
-
Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
5
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
-
El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
6
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
ACM, New York
-
Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169- 178. ACM, New York (2009)
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
7
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Information Security and Cryptology - ICISC 2004: 7th International Conference, Revised Selected Papers
-
Goethals, B., Laur, S., Lipmaa, H., Mielik̈ainen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104-120. Springer, Heidelberg (2005) (Pubitemid 41322351)
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
8
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: STOC 1985, pp. 291-304 (1985)
-
(1985)
STOC 1985
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
9
-
-
79953162324
-
Merging the results of approximate match operations
-
Guha, S.: Merging the results of approximate match operations. In: VLDB, pp. 636-647 (2004)
-
(2004)
VLDB
, pp. 636-647
-
-
Guha, S.1
-
10
-
-
0242453381
-
Coma - A system for flexible combination of schema matching approaches
-
hai Do, H., Rahm, E.: Coma - a system for flexible combination of schema matching approaches. In: VLDB, pp. 610-621 (2002)
-
(2002)
VLDB
, pp. 610-621
-
-
Hai Do, H.1
Rahm, E.2
-
11
-
-
78049382188
-
Privacy-preserving record linkage
-
Domingo-Ferrer, J., Magkos, E. (eds.) Springer, Heidelberg
-
Hall, R., Fienberg, S.E.: Privacy-preserving record linkage. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol. 6344, pp. 269-283. Springer, Heidelberg (2010)
-
PSD 2010. LNCS
, vol.6344
, Issue.2010
, pp. 269-283
-
-
Hall, R.1
Fienberg, S.E.2
-
12
-
-
84976856849
-
The merge/purge problem for large databases
-
Herńandez, M.A., Stolfo, S.J.: The merge/purge problem for large databases. In: SIGMOD (1995)
-
(1995)
SIGMOD
-
-
Herńandez, M.A.1
Stolfo, S.J.2
-
13
-
-
52649087713
-
A hybrid approach to private record linkage
-
Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: ICDE, pp. 496-505 (2008)
-
(2008)
ICDE
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
14
-
-
77952279809
-
Private record matching using differential privacy
-
Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: EDBT, pp. 123-134 (2010)
-
(2010)
EDBT
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
15
-
-
0001368373
-
Etude comparative de la distribution florale dans une portion des alpes et des jura
-
Jaccard, P.: Etude comparative de la distribution florale dans une portion des alpes et des jura. Bulletin del la Socíet́e Vaudoise des Sciences Naturelles 37, 547-579 (1901)
-
(1901)
Bulletin Del la Socíet́e Vaudoise des Sciences Naturelles
, vol.37
, pp. 547-579
-
-
Jaccard, P.1
-
16
-
-
33745160750
-
Privacy-preserving set operations
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005) (Pubitemid 43902117)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
17
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
10.1007/s00778-009-0175-9
-
Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. The VLDB Journal 19, 457-475 (2010) 10.1007/s00778-009-0175-9
-
(2010)
The VLDB Journal
, vol.19
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
18
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
ACM, New York
-
Naccache, D., Stern, J.: A new public key cryptosystem based on higher residues. In: CCS, pp. 59-66. ACM, New York (1998)
-
(1998)
CCS
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
19
-
-
34548725521
-
Group linkage
-
DOI 10.1109/ICDE.2007.367895, 4221698, 23rd International Conference on Data Engineering, ICDE 2007
-
On, B.-W., Koudas, N., Lee, D., Srivastava, D.: Group linkage. In: IEEE ICDE, Istanbul, Turkey, pp. 496-505 (April 2007) (Pubitemid 47422053)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 496-505
-
-
On, B.-W.1
Koudas, N.2
Lee, D.3
Srivastava, D.4
-
20
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.) Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
21
-
-
31144478622
-
Efficient public-key cryptosystems provably secure against active adversaries
-
Lam, K.-Y., Okamoto, E., Xing, C. (eds.) Springer, Heidelberg
-
Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) ASI-ACRYPT 1999. LNCS, vol. 1716, pp. 165-179. Springer, Heidelberg (1999)
-
(1999)
ASI-ACRYPT 1999. LNCS
, vol.1716
, pp. 165-179
-
-
Paillier, P.1
Pointcheval, D.2
-
22
-
-
35448932873
-
Privacy preserving schema and data matching
-
DOI 10.1145/1247480.1247553, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: SIGMOD, pp. 653-664. ACM, New York (2007) (Pubitemid 47630842)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
23
-
-
70350639694
-
Social influence analysis in large-scale networks
-
Tang, J., Sun, J., Wang, C., Yang, Z.: Social influence analysis in large-scale networks. In: KDD, pp. 807-816 (2009)
-
(2009)
KDD
, pp. 807-816
-
-
Tang, J.1
Sun, J.2
Wang, C.3
Yang, Z.4
-
24
-
-
0242456803
-
Learning domain-independent string transformation weights for high accuracy object identification
-
Tejada, S., Knoblock, C.A.: Learning domain-independent string transformation weights for high accuracy object identification. In: ACM SIGKDD, pp. 350-359 (2002)
-
(2002)
ACM SIGKDD
, pp. 350-359
-
-
Tejada, S.1
Knoblock, C.A.2
-
25
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
Gilbert, H. (ed.) Springer, Heidelberg
-
van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24-43. Springer, Heidelberg (2010)
-
EUROCRYPT 2010. LNCS
, vol.6110
, Issue.2010
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
26
-
-
11844281385
-
State-of-the-art in privacy preserving data mining
-
DOI 10.1145/974121.974131
-
Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. SIGMOD Rec. 33(1), 50-57 (2004) (Pubitemid 40290240)
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
28
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society, Washington, DC, USA
-
Yao, A.C.: Protocols for secure computations. In: SFCS 1982: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160-164. IEEE Computer Society, Washington, DC, USA (1982)
-
(1982)
SFCS 1982: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
, pp. 160-164
-
-
Yao, A.C.1
|