-
1
-
-
84859178171
-
Efficient Network Aware Search in Collaborative Tagging Sites
-
August
-
Amer-Yahia, S., Benedikt, M., Lakshmanan, L.V.S., Stoyanovich, J.: Efficient Network Aware Search in Collaborative Tagging Sites. PVLDB 2008 1(1) (August 2008)
-
(2008)
PVLDB 2008
, vol.1
, Issue.1
-
-
Amer-Yahia, S.1
Benedikt, M.2
Lakshmanan, L.V.S.3
Stoyanovich, J.4
-
2
-
-
77952277363
-
Gossiping Personalized Queries
-
Lausanne, Switzerland, March 22-26
-
Bai, X., Bertier, M., Guerraoui, R., Kermarrec, A.-M., Leroy, V.: Gossiping Personalized Queries. In: EDBT 2010, Lausanne, Switzerland, March 22-26 (2010)
-
(2010)
EDBT 2010
-
-
Bai, X.1
Bertier, M.2
Guerraoui, R.3
Kermarrec, A.-M.4
Leroy, V.5
-
3
-
-
34250017239
-
A face is exposed for AOL searcher No. 4417749
-
Barbaro, M., Zeller, T.: A face is exposed for AOL searcher No. 4417749. New York Times (2006)
-
(2006)
New York Times
-
-
Barbaro, M.1
Zeller, T.2
-
4
-
-
79956320804
-
The Gossple Anonymous Social Network
-
Gupta, I., Mascolo, C. (eds.) Middleware 2010. Springer, Heidelberg
-
Bertier, M., Frey, D., Guerraoui, R., Kermarrec, A.-M., Leroy, V.: The Gossple Anonymous Social Network. In: Gupta, I., Mascolo, C. (eds.) Middleware 2010. LNCS, vol. 6452, pp. 191-211. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6452
, pp. 191-211
-
-
Bertier, M.1
Frey, D.2
Guerraoui, R.3
Kermarrec, A.-M.4
Leroy, V.5
-
5
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. CACM 24(2) (February 1982)
-
(1982)
CACM
, vol.24
, Issue.2
-
-
Chaum, D.1
-
6
-
-
84945124606
-
Multiparty Computation from Threshold Homomorphic Encryption
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty Computation from Threshold Homomorphic Encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001) (Pubitemid 33275838)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2045
, pp. 280-300
-
-
Cramer, R.1
Damgard, I.2
Nielsen, J.B.3
-
7
-
-
84867553981
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Public Key Cryptography
-
Damgård, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001) (Pubitemid 33232937)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
8
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, California, USA, August 9-13 (2004)
-
Proceedings of the 13th USENIX Security Symposium, San Diego, California, USA, August 9-13 (2004)
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
9
-
-
70349305273
-
Differential Privacy: A Survey of Results
-
Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. Springer, Heidelberg
-
Dwork, C.: Differential Privacy: A Survey of Results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1-19. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
10
-
-
33746037200
-
Our data, ourselves: Privacy via distributed noise generation
-
DOI 10.1007/11761679-29, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy Via Distributed Noise Generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486-503. Springer, Heidelberg (2006) (Pubitemid 44072257)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
11
-
-
33745556605
-
Calibrating noise to sensitivity in private data analysis
-
DOI 10.1007/11681878-14, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006) (Pubitemid 43979853)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3876 LNCS
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
12
-
-
38049064946
-
Practical and Secure Solutions for Integer Comparison
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Garay, J.A., Schoenmakers, B., Villegas, J.: Practical and Secure Solutions for Integer Comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330-342. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 330-342
-
-
Garay, J.A.1
Schoenmakers, B.2
Villegas, J.3
-
13
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Information Security and Cryptology - ICISC 2004: 7th International Conference, Revised Selected Papers
-
Goethals, B., Laur, S., Lipmaa, H., Mielikäinen, T.: On Private Scalar Product Computation for Privacy-Preserving Data Mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104-120. Springer, Heidelberg (2005) (Pubitemid 41322351)
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
15
-
-
0001442552
-
Properties of the Extended Hypergeometric Distribution
-
June
-
Harkness, W.L.: Properties of the Extended Hypergeometric Distribution. The Annals of Mathematical Statistics 36(3) (June 1965)
-
(1965)
The Annals of Mathematical Statistics
, vol.36
, Issue.3
-
-
Harkness, W.L.1
-
16
-
-
0001368373
-
Étude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura
-
Jaccard, P.: Étude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura. Bulletin de la Société Vaudoise des Sciences Naturelles 37(142) (1901)
-
(1901)
Bulletin de la Société Vaudoise des Sciences Naturelles
, vol.37
, Issue.142
-
-
Jaccard, P.1
-
17
-
-
34548273006
-
Gossip-based Peer Sampling
-
August
-
Jelasity, M., Voulgaris, S., Guerraoui, R., Kermarrec, A.-M., van Steen, M.: Gossip-based Peer Sampling. In: TOCS 2007, vol. 25(3) (August 2007)
-
(2007)
TOCS 2007
, vol.25
, Issue.3
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
Van Steen, M.5
-
18
-
-
57949111704
-
What Can We Learn Privately?
-
Philadelphia, Pennsylvania, USA, October 25-28
-
Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What Can We Learn Privately?. In: FOCS 2008, Philadelphia, Pennsylvania, USA, October 25-28 (2008)
-
(2008)
FOCS 2008
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
19
-
-
33745160750
-
Privacy-Preserving Set Operations
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Kissner, L., Song, D.X.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
20
-
-
70350678967
-
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders
-
June 28-July 1. ACM, Paris
-
McSherry, F., Mironov, I.: Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In: SIGKDD 2009, June 28-July 1. ACM, Paris (2009)
-
(2009)
SIGKDD 2009
-
-
McSherry, F.1
Mironov, I.2
-
21
-
-
50249142450
-
Robust De-anonymization of Large Sparse Datasets
-
Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: Proceedings of the 29th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)
-
Proceedings of the 29th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 18-21 (2008)
-
-
Narayanan, A.1
Shmatikov, V.2
-
22
-
-
70449632682
-
De-anonymizing Social Networks
-
Narayanan, A., Shmatikov, V.: De-anonymizing Social Networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 17-20 (2009)
-
Proceedings of the 30th IEEE Symposium on Security and Privacy, Oakland, California, USA, May 17-20 (2009)
-
-
Narayanan, A.1
Shmatikov, V.2
-
23
-
-
38049034355
-
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
-
Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
-
Nishide, T., Ohta, K.: Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 343-360. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4450
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
24
-
-
84055174878
-
Distributed Paillier Cryptosystem without Trusted Dealer
-
Jeju Island, Korea, August 24-26
-
Nishide, T., Sakurai, K.: Distributed Paillier Cryptosystem without Trusted Dealer. In: WISA 2010, Jeju Island, Korea, August 24-26 (2010)
-
(2010)
WISA 2010
-
-
Nishide, T.1
Sakurai, K.2
-
25
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
26
-
-
0002054934
-
Crowds: Anonymity forWeb Transactions
-
November
-
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity forWeb Transactions. TISSEC 1(1) (November 1998)
-
(1998)
TISSEC
, vol.1
, Issue.1
-
-
Reiter, M.K.1
Rubin, A.D.2
-
27
-
-
51849103902
-
Privacy Preserving Nearest Neighbor Search
-
December 18-22. IEEE, Hong Kong
-
Shaneck, M., Kim, Y., Kumar, V.: Privacy Preserving Nearest Neighbor Search. In: ICDM 2006, December 18-22. IEEE, Hong Kong (2006)
-
(2006)
ICDM 2006
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
28
-
-
12244255356
-
Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data
-
August 22-25. ACM, Seattle
-
Wright, R.N., Yang, Z.: Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data. In: SIGKDD 2004, August 22-25. ACM, Seattle (2004)
-
(2004)
SIGKDD 2004
-
-
Wright, R.N.1
Yang, Z.2
-
29
-
-
36649012191
-
Private Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust
-
Moncton, New Brunswick, Canada, July 30-August 2
-
Yao, D., Tamassia, R., Proctor, S.: Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust. In: IFIPTM 2007, Moncton, New Brunswick, Canada, July 30-August 2 (2007)
-
(2007)
IFIPTM 2007
-
-
Yao, D.1
Tamassia, R.2
Proctor, S.3
|