-
1
-
-
79960844353
-
Strong Conditional Oblivious Transfer and Computing on Intervals
-
Blake, I. and Kolesnikov, V. (2004). Strong Conditional Oblivious Transfer and Computing on Intervals. Advances in Cryptology--ASIACRYPT, 2004, 515-529.
-
(2004)
Advances In Cryptology--ASIACRYPT
, vol.2004
, pp. 515-529
-
-
Blake, I.1
Kolesnikov, V.2
-
3
-
-
77954718437
-
Privacy-preserving Data Publishing
-
Chen, B.-C., Kifer, K., LeFevre, K., and Machanavajjhala, A. (2009). Privacy-preserving Data Publishing. Foundations and Trends in Databases, 2, 1-167.
-
(2009)
Foundations and Trends In Databases
, vol.2
, pp. 1-167
-
-
Chen, B.-C.1
Kifer, K.2
Lefevre, K.3
Machanavajjhala, A.4
-
4
-
-
84857074849
-
-
2004 SIAM International Conference on Data Mining, M.W. Berry, U. Dayal, C. Kamath, and D.B. Skillicorn (eds). Florida: Lak Buena Vista
-
Du, W., Han, Y.-S., and Chen, S. (2004). Privacy-preserving Multivariate Statistical Analysis: Linear Regression and Classification. 2004 SIAM International Conference on Data Mining, M.W. Berry, U. Dayal, C. Kamath, and D.B. Skillicorn (eds). Florida: Lak Buena Vista.
-
(2004)
Privacy-preserving Multivariate Statistical Analysis: Linear Regression and Classification
-
-
Du, W.1
Han, Y.-S.2
Chen, S.3
-
6
-
-
0011583645
-
-
Technical Report, National Institute of Statistical Sciences, December,
-
Duncan, G.T., Keller-McNulty, S., and Stokes, L. (2001b) Disclosure Risk vs. Data Utility: The R-U Confidentiality Map. Technical Report, National Institute of Statistical Sciences, December, No. 121.
-
(2001)
Disclosure Risk Vs. Data Utility: The R-U Confidentiality Map
, pp. 121
-
-
Duncan, G.T.1
Keller-McNulty, S.2
Stokes, L.3
-
7
-
-
84972531331
-
Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future
-
Duncan, G.T. and Pearson, R.W. (1991). Enhancing Access to Microdata while Protecting Confidentiality: Prospects for the Future. Statistical Science, 6, 219-232.
-
(1991)
Statistical Science
, vol.6
, pp. 219-232
-
-
Duncan, G.T.1
Pearson, R.W.2
-
9
-
-
33746037200
-
Our Data Ourselves: Privacy via Distributed Noise Generation
-
Berlin: Springer
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., and Naor, M. (2006). Our Data Ourselves: Privacy via Distributed Noise Generation. Advances in Cryptology (EUROCRYPT 2006), LNCS Vol. 4004. Berlin: Springer, 486-503.
-
(2006)
Advances In Cryptology (EUROCRYPT 2006), LNCS
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
11
-
-
0000983892
-
Masking Procedures for Microdata
-
Fuller, W.A. (1993). Masking Procedures for Microdata. Journal of Official Statistics, 9, 383-406.
-
(1993)
Journal of Official Statistics
, vol.9
, pp. 383-406
-
-
Fuller, W.A.1
-
12
-
-
26444451487
-
On Secure Scalar Product Computation for Privacy-preserving Data Mining
-
Goethals, B., Laur, S., Lipmaa, H., and Mielikainen, T. (2004). On Secure Scalar Product Computation for Privacy-preserving Data Mining. ISISC, 2004.
-
(2004)
ISISC
, pp. 2004
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
16
-
-
20744460179
-
Secure Regression on Distributed Databases
-
Karr, A.F., Lin, X., Reiter, J.P., and Sanil, A.P. (2005). Secure Regression on Distributed Databases. Journal of Computational and Graphical Statistics, 14, 263-279.
-
(2005)
Journal of Computational and Graphical Statistics
, vol.14
, pp. 263-279
-
-
Karr, A.F.1
Lin, X.2
Reiter, J.P.3
Sanil, A.P.4
-
17
-
-
78049354221
-
Secure Analysis of Distributed Databases
-
D. Olwell, A.G. Wilson, and G. Wilson (eds). New York: Springer-Verlag
-
Karr, A.F., Lin, X., Reiter, J.P., and Sanil, A.P. (2006). Secure Analysis of Distributed Databases. In Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication, D. Olwell, A.G. Wilson, and G. Wilson (eds). New York: Springer-Verlag, 237-261.
-
(2006)
Statistical Methods In Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
, pp. 237-261
-
-
Karr, A.F.1
Lin, X.2
Reiter, J.P.3
Sanil, A.P.4
-
18
-
-
77349092141
-
Privacy-preserving Analysis of Vertically Partitioned Data using Secure Matrix Products
-
Karr, A.F., Lin, X., Sanil, A.P., and Reiter, J.P. (2009). Privacy-preserving Analysis of Vertically Partitioned Data using Secure Matrix Products. Journal of Official Statistics, 25, 125-138.
-
(2009)
Journal of Official Statistics
, vol.25
, pp. 125-138
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
19
-
-
33746437508
-
Privacy Preserving Data Mining
-
Lindell, Y. and Pinkas, B. (2002). Privacy Preserving Data Mining. Journal of Cryptology, 15, 177-206.
-
(2002)
Journal of Cryptology
, vol.15
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
20
-
-
70350674448
-
Private Data Analysis via Output Perturbation
-
Charu C. Aggarwal and P.S. Yu (eds). New York: Springer
-
Nissim, K. (2008). Private Data Analysis via Output Perturbation. In Privacy-Preserving Data Mining: Models and Algorithms, Charu C. Aggarwal and P.S. Yu (eds). New York: Springer, 385-416.
-
(2008)
Privacy-Preserving Data Mining: Models and Algorithms
, pp. 385-416
-
-
Nissim, K.1
-
22
-
-
56749150780
-
A Remote Analysis Server--What Does Regression Output Look Like?
-
PSD 2008, J. Domingo-Ferrer and Y. Saygin (eds). LNCS, Berlin: Springer
-
O'Keefe, C.M. and Good, N.M. (2008). A Remote Analysis Server--What Does Regression Output Look Like? Privacy in Statistical Databases, PSD 2008, J. Domingo-Ferrer and Y. Saygin (eds). LNCS 5262. Berlin: Springer, 270-283.
-
(2008)
Privacy In Statistical Databases
, vol.5262
, pp. 270-283
-
-
O'Keefe, C.M.1
Good, N.M.2
-
23
-
-
72049086690
-
Regression Output from a Remote Analysis Server
-
O'Keefe, C.M. and Good, N.M. (2009). Regression Output from a Remote Analysis Server. Data & Knowledge Engineering, 68, 1175-1186.
-
(2009)
Data & Knowledge Engineering
, vol.68
, pp. 1175-1186
-
-
O'Keefe, C.M.1
Good, N.M.2
-
24
-
-
84942550998
-
Public-key Cryptosystems based on Composite Degree Residuosity Classes
-
J. Stern (ed.). LNCS, Berlin: Springer-Verlag
-
Paillier, P. (1999). Public-key Cryptosystems based on Composite Degree Residuosity Classes. Advances in Cryptology (EUROCRYPT 1999), J. Stern (ed.). LNCS Vol. 1592. Berlin: Springer-Verlag, 223-238.
-
(1999)
Advances In Cryptology (EUROCRYPT 1999)
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
0346171307
-
Model Diagnostics for Remote-access Regression Servers
-
Reiter, J.P. (2003). Model Diagnostics for Remote-access Regression Servers. Statistics and Computing, 13, 371-380.
-
(2003)
Statistics and Computing
, vol.13
, pp. 371-380
-
-
Reiter, J.P.1
-
26
-
-
35448932873
-
-
SIGMOD 2007
-
Scannapieco, M., Figotin, I., Bertino, E., and Elmagarmid, A.K. (2007). Privacy Preserving Schema and Data Matching. SIGMOD 2007, 653-664.
-
(2007)
Privacy Preserving Schema and Data Matching
, pp. 653-664
-
-
Scannapieco, M.1
Figotin, I.2
Bertino, E.3
Elmagarmid, A.K.4
-
27
-
-
61349120273
-
Random Orthogonal Matrix Masking Methodology for Microdata Release
-
Ting, D., Fienberg, S.E., and Trottini, M. (2008). Random Orthogonal Matrix Masking Methodology for Microdata Release. International Journal of Information and Computer Security, 2, 86-105.
-
(2008)
International Journal of Information and Computer Security
, vol.2
, pp. 86-105
-
-
Ting, D.1
Fienberg, S.E.2
Trottini, M.3
-
28
-
-
37249006646
-
Additive Noise and Multiplicative Bias as Disclosure Limitation Techniques for Continuous Microdata: A Simulation Study
-
Trottini, M., Fienberg, S.E., Makov, U.E., and Meyer, M.M. (2004). Additive Noise and Multiplicative Bias as Disclosure Limitation Techniques for Continuous Microdata: A Simulation Study. Journal of Computational Methods in Sciences and Engineering, 4, 5-16.
-
(2004)
Journal of Computational Methods In Sciences and Engineering
, vol.4
, pp. 5-16
-
-
Trottini, M.1
Fienberg, S.E.2
Makov, U.E.3
Meyer, M.M.4
-
30
-
-
0020312165
-
-
Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science
-
Yao, A.C. (1982). Protocols for Secure Computations. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, 160-164.
-
(1982)
Protocols For Secure Computations
, pp. 160-164
-
-
Yao, A.C.1
|