-
1
-
-
84861155173
-
-
[Online]
-
List of Social NetworkingWebsites 2009 [Online]. Available: http://en. wikipedia.org/wiki/List-of-social
-
(2009)
List of Social NetworkingWebsites
-
-
-
2
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
DOI 10.1109/TKDE.2005.99
-
G. Adomavicius and A. Tuzhilin, "Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions," IEEE Trans. Knowl. Data Eng., vol. 17, no. 6, pp. 734-749, Jun. 2005. (Pubitemid 40860454)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
3
-
-
0035509452
-
Privacy risks in recommender systems
-
Nov./Dec.
-
N. Ramakrishnan, B. J. Keller, B. J. Mirza, A. Y. Grama, and G. Karypis, "Privacy risks in recommender systems," IEEE Internet Comput., vol. 5, no. 6, pp. 54-63, Nov./Dec. 2001.
-
(2001)
IEEE Internet Comput.
, vol.5
, Issue.6
, pp. 54-63
-
-
Ramakrishnan, N.1
Keller, B.J.2
Mirza, B.J.3
Grama, A.Y.4
Karypis, G.5
-
5
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," in Proc. SIGMOD Rec., May 2000, vol. 29, pp. 439-450.
-
(2000)
Proc. SIGMOD Rec.
, vol.29
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
84974555530
-
Privacy preserving data mining
-
Springer-Verlag
-
Y. Lindell and B. Pinkas, "Privacy preserving data mining," J. Cryptol., pp. 36-54, 2000, Springer-Verlag.
-
(2000)
J. Cryptol.
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
7
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques.," in Proc. ICDM, 2003, pp. 625-628.
-
(2003)
Proc. ICDM
, pp. 625-628
-
-
Polat, H.1
Du, W.2
-
8
-
-
33644514610
-
SVD-based collaborative filtering with privacy
-
New York, NY ACM Press
-
H. Polat andW. Du, "SVD-based collaborative filtering with privacy," in Proc. 2005 ACM Symp. Applied Computing (SAC'05), New York, NY, 2005, pp. 791-795, ACM Press.
-
(2005)
Proc. 2005 ACM Symp. Applied Computing (SAC'05)
, pp. 791-795
-
-
Polat, H.1
Du, W.2
-
9
-
-
33745432713
-
Deriving private information from randomly perturbed ratings
-
Proceedings of the Sixth SIAM International Conference on Data Mining
-
S. Zhang, J. Ford, and F. Makedon, "Deriving private information from randomly perturbed ratings," in Proc. Sixth SIAM Int. Conf. Data Mining, 2006, pp. 59-69. (Pubitemid 43955526)
-
(2006)
Proceedings of the Sixth SIAM International Conference on Data Mining
, vol.2006
, pp. 59-69
-
-
Zhang, S.1
Ford, J.2
Makedon, F.3
-
10
-
-
72249112536
-
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
-
New York, NY ACM
-
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux, "Preserving privacy in collaborative filtering through distributed aggregation of offline profiles," in Proc. Third ACM Conf. Recommender Systems (RecSys'09), New York, NY, 2009, pp. 157-164, ACM.
-
(2009)
Proc. Third ACM Conf. Recommender Systems (RecSys'09)
, pp. 157-164
-
-
Shokri, R.1
Pedarsani, P.2
Theodorakopoulos, G.3
Hubaux, J.-P.4
-
11
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the net
-
New York, NY ACM
-
F.McSherry and I. Mironov, "Differentially private recommender systems: Building privacy into the net," in Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'09), New York, NY, 2009, pp. 627-636, ACM.
-
(2009)
Proc. 15th ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD'09)
, pp. 627-636
-
-
Mcsherry, F.1
Mironov, I.2
-
12
-
-
63249100535
-
An agent-based approach for privacypreserving recommender systems
-
New York, NY ACM
-
R. Cissée and S. Albayrak, "An agent-based approach for privacypreserving recommender systems," in Proc. 6th Int. Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS'07), New York, NY, 2007, pp. 1-8, ACM.
-
(2007)
Proc. 6th Int. Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS'07)
, pp. 1-8
-
-
Cissée, R.1
Albayrak, S.2
-
13
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
-
M.Atallah, M. Bykova, J. Li,K. Frikken, andM. Topkara, "Private collaborative forecasting and benchmarking," in Proc. 2004 ACM Workshop on Privacy in the Electronic Society (WPES'04), New York, NY, 2004, pp. 103-114, ACM. (Pubitemid 40821100)
-
(2004)
WPES'04: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 103-114
-
-
Atallah, M.1
Bykova, M.2
Li, J.3
Frikken, K.4
Topkara, M.5
-
14
-
-
0036082701
-
Collaborative filtering with privacy
-
J. F. Canny, "Collaborative filtering with privacy.," in IEEE Symp. Security and Privacy, 2002, pp. 45-57.
-
(2002)
IEEE Symp. Security and Privacy
, pp. 45-57
-
-
Canny, J.F.1
-
15
-
-
0036993076
-
Collaborative filtering with privacy via factor analysis
-
New York, NY: ACM Press
-
J. F. Canny, "Collaborative filtering with privacy via factor analysis," in SIGIR. New York, NY: ACM Press, 2002, pp. 238-245.
-
(2002)
SIGIR
, pp. 238-245
-
-
Canny, J.F.1
-
16
-
-
79952530607
-
Privacy enhanced recommender system
-
Z. Erkin, M. Beye, T. Veugen, andR. L. Lagendijk, "Privacy enhanced recommender system," in Proc. Thirty-First Symp. Information Theory in the Benelux, Rotterdam, 2010, pp. 35-42.
-
(2010)
Proc. Thirty-First Symp. Information Theory in the Benelux, Rotterdam
, pp. 35-42
-
-
Erkin, Z.1
Beye, M.2
Veugen, T.3
Lagendijk, R.L.4
-
17
-
-
80051602733
-
Efficiently computing private recommendations
-
Prague, Czech Republic,May
-
Z. Erkin, M. Beye, T. Veugen, and R. L. Lagendijk, "Efficiently computing private recommendations," in Proc. Int. Conf. Acoustic, Speech and Signal Processing (ICASSP), Prague, Czech Republic,May 2011, pp. 5864-5867, 2011.
-
(2011)
Proc. Int. Conf. Acoustic, Speech and Signal Processing (ICASSP)
, vol.2011
, pp. 5864-5867
-
-
Erkin, Z.1
Beye, M.2
Veugen, T.3
Lagendijk, R.L.4
-
18
-
-
38849191685
-
A secure multidimensional point inclusion protocol
-
DOI 10.1145/1288869.1288884, MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
-
J. R. Troncoso-Pastoriza, S. Katzenbeisser, M. U. Celik, and A. N. Lemma, "A secure multidimensional point inclusion protocol," in Proc. ACM Workshop on Multimedia and Security, 2007, pp. 109-120. (Pubitemid 351203809)
-
(2007)
MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
, pp. 109-120
-
-
Troncoso-Pastoriza, J.R.1
Katzenbeisser, S.2
Celik, M.3
Lemma, A.4
-
19
-
-
77249117753
-
Composite signal representation for fast and storage-efficient processing of encrypted signals
-
Mar.
-
T. Bianchi, A. Piva, and M. Barni, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180-187, Mar. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.1
, pp. 180-187
-
-
Bianchi, T.1
Piva, A.2
Barni, M.3
-
20
-
-
33645593031
-
Foundations of cryptography
-
1st ed. Cambridge, U.K.: Cambridge Univ. Press May ISBN 0-521-83084-2
-
O. Goldreich, Foundations of Cryptography. Basic Applications, 1st ed. Cambridge, U.K.: Cambridge Univ. Press, May 2004, vol. 2, ISBN 0-521-83084-2.
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
21
-
-
70350379222
-
Secure multiparty computation goes live
-
P.Bogetoft, D. L.Christensen, I. Damgård, M. Geisler, T. P. Jakobsen, M. Krøigaard, J. D. Nielsen, J. B. Nielsen, K. Nielsen, J. Pagter, M. I. Schwartzbach, and T. Toft, "Secure multiparty computation goes live," in Proc. Financial Cryptography, 2009, pp. 325-343.
-
(2009)
Proc. Financial Cryptography
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.P.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Proc. Advances in Cryptology (EUROCRYPT' 99), ser J. Stern, Ed. May 2-6 Springer
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. Advances in Cryptology (EUROCRYPT' 99), ser. LNCS, J. Stern, Ed., May 2-6, 1999, vol. 1592, pp. 223-238, Springer.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
38149074802
-
Efficient and secure comparison for on-line auctions
-
Proc. Australasian Conf. Information Security and Privacy (ACSIP 2007), ser J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Jul. 2-4 Springer
-
I. Damgård, M. Geisler, and M. Krøigaard, "Efficient and secure comparison for on-line auctions," in Proc. Australasian Conf. Information Security and Privacy (ACSIP 2007), ser. LNCS, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Jul. 2-4, 2007, vol. 4586, pp. 416-430, Springer.
-
(2007)
LNCS
, vol.4586
, pp. 416-430
-
-
Damgård, I.1
Geisler, M.2
Krøigaard, M.3
-
25
-
-
85015559680
-
An algorithmic framework for performing collaborative filtering
-
New York, NY ACM
-
J. L. Herlocker, J. A. Konstan, A. Borchers, and J. Riedl, "An algorithmic framework for performing collaborative filtering," in Proc. 22nd Ann. Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR'99), New York, NY, 1999, pp. 230-237, ACM.
-
(1999)
Proc. 22nd Ann. Int. ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR'99)
, pp. 230-237
-
-
Herlocker, J.L.1
Konstan, J.A.2
Borchers, A.3
Riedl, J.4
-
26
-
-
69949163699
-
Privacy-preserving face recognition
-
Seattle, WA
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, R. L. Lagendijk, and T. Toft, "Privacy-preserving face recognition," in Proc. Privacy Enhancing Technologies Symp., Seattle, WA, 2009, pp. 235-253.
-
(2009)
Proc. Privacy Enhancing Technologies Symp.
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, R.L.5
Toft, T.6
-
27
-
-
35048828873
-
Practical two-party computation based on the conditional gate
-
B. Schoenmakers and P. Tuyls, "Practical two-party computation based on the conditional gate," in Proc. Advances in Cryptology, 2004, vol. 3329, pp. 119-136, Springer-Verlag. (Pubitemid 39747750)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3329
, pp. 119-136
-
-
Schoenmakers, B.1
Tuyls, P.2
-
28
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Jul.
-
T. E. Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory, vol. 31, no. 4, pp. 469-472, Jul. 1985.
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Gamal, T.E.1
-
31
-
-
77954610725
-
Efficient privacypreserving face recognition
-
Berlin, Heidelberg, Germany Springer-Verlag
-
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient privacypreserving face recognition," in Proc. 12th Int. Conf. Information Security and Cryptology (ICISC'09), Berlin, Heidelberg, Germany, 2010, pp. 229-244, Springer-Verlag.
-
(2010)
Proc. 12th Int. Conf. Information Security and Cryptology (ICISC'09)
, pp. 229-244
-
-
Sadeghi, A.-R.1
Schneider, T.2
Wehrenberg, I.3
-
33
-
-
84945124606
-
Multiparty computation from threshold homomorphic encryption
-
London, U.K. Springer-Verlag
-
R. Cramer, I. Damgård, and J. B. Nielsen, "Multiparty computation from threshold homomorphic encryption," in Proc. Int. Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT'01), London, U.K., 2001, pp. 280-299, Springer-Verlag.
-
(2001)
Proc. Int. Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT'01)
, pp. 280-299
-
-
Cramer, R.1
Damgård, I.2
Nielsen, J.B.3
|