-
1
-
-
83055184802
-
-
Nhin
-
Nhin: http://www.hhs.gov/healthit/healthnetwork.
-
-
-
-
2
-
-
70350546040
-
Privacy-preserving indexing of documents on the network
-
M. Bawa, R. J. Bayardo, Jr, R. Agrawal, and J. Vaidya. Privacy-preserving indexing of documents on the network. The VLDB Journal, 18(4), 2009.
-
(2009)
The VLDB Journal
, vol.18
, Issue.4
-
-
Bawa, M.1
Bayardo Jr., R.J.2
Agrawal, R.3
Vaidya, J.4
-
4
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
D. Bogdanov, S. Laur, and J. Willemson. Sharemind: A framework for fast privacy-preserving computations. In ESORICS, pages 192-206, 2008.
-
(2008)
ESORICS
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
8
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekçi, D. Agrawal, A. E. Abbadi, and A. Gulbeden. Privacy preserving query processing using third parties. In ICDE, page 27, 2006.
-
(2006)
ICDE
, pp. 27
-
-
Emekçi, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
10
-
-
0030689525
-
Multi-party computations: Past and present
-
S. Goldwasser. Multi-party computations: Past and present. In PODC, pages 1-6, 1997.
-
(1997)
PODC
, pp. 1-6
-
-
Goldwasser, S.1
-
11
-
-
70349093653
-
Overview of the trec-9 web track
-
D. Hawking. Overview of the trec-9 web track. In TREC, 2000.
-
(2000)
TREC
-
-
Hawking, D.1
-
12
-
-
0037717696
-
Passive estimation of tcp round-trip times
-
H. Jiang and C. Dovrolis. Passive estimation of tcp round-trip times. Computer Communication Review, 32(3):75-88, 2002.
-
(2002)
Computer Communication Review
, vol.32
, Issue.3
, pp. 75-88
-
-
Jiang, H.1
Dovrolis, C.2
-
13
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. W. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.W.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
34848885457
-
An empirical study of collusion behavior in the maze p2p file-sharing system
-
Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li. An empirical study of collusion behavior in the maze p2p file-sharing system. In ICDCS, 2007.
-
(2007)
ICDCS
-
-
Lian, Q.1
Zhang, Z.2
Yang, M.3
Zhao, B.Y.4
Dai, Y.5
Li, X.6
-
15
-
-
33746437508
-
Privacy preserving data mining
-
DOI 10.1007/s00145-001-0019-2
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptology, 15(3):177-206, 2002. (Pubitemid 44126466)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
16
-
-
18744365513
-
Content-based retrieval in hybrid peer-to-peer networks
-
J. Lu and J. P. Callan. Content-based retrieval in hybrid peer-to-peer networks. In CIKM, pages 199-206, 2003.
-
(2003)
CIKM
, pp. 199-206
-
-
Lu, J.1
Callan, J.P.2
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
56149106496
-
A high collusion-resistant approach to distributed privacy-preserving data mining
-
S. Urabe, J.Wang, E. Kodama, and T. Takata. A high collusion-resistant approach to distributed privacy-preserving data mining. In Parallel and Distributed Computing and Networks, pages 307-312, 2007.
-
(2007)
Parallel and Distributed Computing and Networks
, pp. 307-312
-
-
Urabe, S.1
Wang, J.2
Kodama, E.3
Takata, T.4
-
22
-
-
27944448114
-
Topk queries across multiple private databases
-
L. Xiong, S. Chitti, and L. Liu. Topk queries across multiple private databases. In ICDCS, pages 145-154, 2005.
-
(2005)
ICDCS
, pp. 145-154
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
-
23
-
-
43349086436
-
Zerber: R-confidential indexing for distributed documents
-
S. Zerr, E. Demidova, D. Olmedilla, W. Nejdl, M. Winslett, and S. Mitra. Zerber: r-confidential indexing for distributed documents. In EDBT, pages 287-298, 2008.
-
(2008)
EDBT
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
|