메뉴 건너뛰기




Volumn , Issue , 2011, Pages 82-87

Generating private recommendations in a social trust network

Author keywords

homomorphic encryption; privacy; recommender systems; secure multi party computation; Social trust networks

Indexed keywords

CRYPTOGRAPHIC PROTOCOLS; ENCRYPTED DATA; HOMOMORPHIC-ENCRYPTIONS; PERSONALIZED SERVICE; PRIVACY RISKS; PRIVATE DATA; SECURE MULTI-PARTY COMPUTATION; SOCIAL NETWORKS; TRUST NETWORKS;

EID: 84055190759     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CASON.2011.6085923     Document Type: Conference Paper
Times cited : (16)

References (25)
  • 4
    • 0036993076 scopus 로고    scopus 로고
    • Collaborative filtering with privacy via factor analysis
    • New York, NY, USA, ACM Press
    • J. F. Canny. Collaborative filtering with privacy via factor analysis. In SIGIR, pages 238-245, New York, NY, USA, 2002. ACM Press.
    • (2002) SIGIR , pp. 238-245
    • Canny, J.F.1
  • 7
    • 78649464426 scopus 로고    scopus 로고
    • A generalization of paillier's public-key system with applications to electronic voting
    • I. Damgard, M. Jurik, and J. Nielsen. A generalization of paillier's public-key system with applications to electronic voting. International Journal of Information Security, 9(6):371-385, 2010.
    • (2010) International Journal of Information Security , vol.9 , Issue.6 , pp. 371-385
    • Damgard, I.1    Jurik, M.2    Nielsen, J.3
  • 10
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient private matching and set intersection. In EUROCRYPT, pages 1-19, 2004.
    • (2004) EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 11
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. E. Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31(4):469-472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 12
    • 33750077260 scopus 로고    scopus 로고
    • Combining provenance with trust in social networks for semantic web content filtering
    • J. Golbeck. Combining provenance with trust in social networks for semantic web content filtering. In IPAW, pages 101-108, 2006.
    • (2006) IPAW , pp. 101-108
    • Golbeck, J.1
  • 13
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, first edition, May ISBN 0-521-83084-2
    • O. Goldreich. Foundations of Cryptography. Basic Applications, volume 2. Cambridge University Press, first edition, May 2004. ISBN 0-521-83084-2.
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 14
    • 0023545076 scopus 로고
    • How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority
    • ACM, May 25-27
    • O. Goldreich, S. Micali, and A. Wigderson. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. In ACM Symposium on Theory of Computing - STOC '87, pages 218-229. ACM, May 25-27, 1987.
    • (1987) ACM Symposium on Theory of Computing - STOC '87 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 17
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • J. Stern, editor, Advances in Cryptology -EUROCRYPT '99, Springer, May 2-6
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In J. Stern, editor, Advances in Cryptology -EUROCRYPT '99, volume 1592 of LNCS, pages 223-238. Springer, May 2-6, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 18
    • 46749122242 scopus 로고    scopus 로고
    • Privacy-preserving collaborative filtering using randomized perturbation techniques
    • H. Polat and W. Du. Privacy-preserving collaborative filtering using randomized perturbation techniques. In ICDM, pages 625-628, 2003.
    • (2003) ICDM , pp. 625-628
    • Polat, H.1    Du, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.