-
1
-
-
34250017239
-
A Face Is Exposed for AOL Searcher No. 4417749
-
9 August
-
M. Barbaro and T. Z. Jr., "A Face Is Exposed for AOL Searcher No. 4417749," The New York Times, 9 August 2006, http://www.nytimes.com/2006/ 08/09/technology/09aol.html.
-
(2006)
The New York Times
-
-
Barbaro, M.1
Z Jr., T.2
-
2
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second-Generation Onion Router," in USENIX Security Symposium, August 2004, pp. 303-320.
-
USENIX Security Symposium, August 2004
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
3
-
-
33751031560
-
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)
-
J. Bethencourt, D. Song, and B. Waters, "New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)," in IEEE Symposium on Security and Privacy (S&P), May 2006, pp. 132-139.
-
IEEE Symposium on Security and Privacy (S&P), May 2006
, pp. 132-139
-
-
Bethencourt, J.1
Song, D.2
Waters, B.3
-
4
-
-
84864184586
-
Keyword Search and Oblivious Pseudorandom Functions
-
M. J. Freedman, Y. Ishai, B. Pinkas, and O. Reingold, "Keyword Search and Oblivious Pseudorandom Functions," in Theory of Cryptography Conference, Feburary 2005.
-
Theory of Cryptography Conference, Feburary 2005
-
-
Freedman, M.J.1
Ishai, Y.2
Pinkas, B.3
Reingold, O.4
-
5
-
-
17444370055
-
Public Key Encryption with Keyword Search
-
May
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public Key Encryption with Keyword Search," in EUROCRYPT, May 2004.
-
(2004)
EUROCRYPT
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
6
-
-
0033705124
-
Practical Techniques for Searches on Encrypted Data
-
D. X. Song, D. Wagner, and A. Perrig, "Practical Techniques for Searches on Encrypted Data," in IEEE Symposium on Security and Privacy (S&P), May 2000, pp. 44-55.
-
IEEE Symposium on Security and Privacy (S&P), May 2000
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
8
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, "Private information retrieval," in IEEE Symposium on Foundations of Computer Science (FOCS), 1995.
-
IEEE Symposium on Foundations of Computer Science (FOCS), 1995
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
13
-
-
58349110852
-
Privacy Protection in Personalized Search
-
June
-
X. Shen, B. Tan, and C. Zhai, "Privacy Protection in Personalized Search," ACM SIGIR Forum, vol. 41, no. 1, pp. 4-17, June 2007.
-
(2007)
ACM SIGIR Forum
, vol.41
, Issue.1
, pp. 4-17
-
-
Shen, X.1
Tan, B.2
Zhai, C.3
-
14
-
-
52649171325
-
Similar Document Detection with Limited Information Disclosure
-
W. Jiang, M. Murugesan, C. Clifton, and L. Si, "Similar Document Detection with Limited Information Disclosure," in IEEE International Conference on Data Engineering (ICDE), 2008, pp. 735-743.
-
IEEE International Conference on Data Engineering (ICDE), 2008
, pp. 735-743
-
-
Jiang, W.1
Murugesan, M.2
Clifton, C.3
Si, L.4
-
15
-
-
76849085704
-
Privacy-Preserving, Similarity-Based Text Retrieval
-
February
-
H. Pang, J. Shen, and R. Krishnan, "Privacy-Preserving, Similarity-Based Text Retrieval," ACM Transactions on Internet Technology, vol. 10, no. 1, February 2010.
-
(2010)
ACM Transactions on Internet Technology
, vol.10
, Issue.1
-
-
Pang, H.1
Shen, J.2
Krishnan, R.3
-
16
-
-
20744443825
-
On the Use of the Singular Value Decomposition for Text Retrieval
-
P. Husbands, H. Simon, and C. H. Q. Ding, "On The Use Of The Singular Value Decomposition For Text Retrieval," in SIAM Computational Information Retrieval, 2001, pp. 145-156.
-
(2001)
SIAM Computational Information Retrieval
, pp. 145-156
-
-
Husbands, P.1
Simon, H.2
Ding, C.H.Q.3
-
19
-
-
1942420748
-
Oblivious Keyword Search
-
April/June
-
K. Kurosawa and W. Ogata, "Oblivious Keyword Search," Journal of Complexity, vol. 20, no. 2-3, pp. 356-371, April/June 2004.
-
(2004)
Journal of Complexity
, vol.20
, Issue.2-3
, pp. 356-371
-
-
Kurosawa, K.1
Ogata, W.2
-
20
-
-
36749033301
-
Private Searching on Streaming Data
-
October
-
R. Ostrovsky and W. E. Skeith, "Private Searching on Streaming Data," Journal of Cryptology, vol. 20, no. 4, pp. 397-430, October 2007.
-
(2007)
Journal of Cryptology
, vol.20
, Issue.4
, pp. 397-430
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
21
-
-
3142716056
-
Order Preserving Encryption for Numeric Data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order Preserving Encryption for Numeric Data," in ACM Special Interest Group on Management of Data (SIGMOD), 2004, pp. 563-574.
-
ACM Special Interest Group on Management of Data (SIGMOD), 2004
, pp. 563-574
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
22
-
-
18744366643
-
Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs
-
E. Damiani, S. D. C. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, "Balancing Confidentiality and Efficiency in Untrusted Relational DBMSs," in ACM Conference on Computer and Communications Security (CCS), 2003, pp. 93-102.
-
ACM Conference on Computer and Communications Security (CCS), 2003
, pp. 93-102
-
-
Damiani, E.1
Vimercati, S.D.C.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
23
-
-
0036361105
-
Executing SQL over Encrypted Data in the Database Service Provider Model
-
H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over Encrypted Data in the Database Service Provider Model," in ACM Special Interest Group on Management of Data (SIGMOD), 2002, pp. 216-227.
-
ACM Special Interest Group on Management of Data (SIGMOD), 2002
, pp. 216-227
-
-
Hacigumus, H.1
Iyer, B.2
Li, C.3
Mehrotra, S.4
-
24
-
-
33244488406
-
Secure Indexes
-
ePrint Archive, Report 2003/216
-
E. Goh, "Secure Indexes," in Cryptology ePrint Archive, Report 2003/216, 2003.
-
(2003)
Cryptology
-
-
Goh, E.1
-
25
-
-
0014814325
-
Space/Time Trade-Offs in Hash Coding with Allowable Errors
-
July
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, July 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
26
-
-
85012127915
-
Privacy-Preserving Indexing of Documents on the Network
-
M. Bawa, R. J. B. Jr., and R. Agrawal, "Privacy-Preserving Indexing of Documents on the Network," in International Conference on Very Large Data Bases (VLDB), 2003, pp. 922-933.
-
International Conference on Very Large Data Bases (VLDB), 2003
, pp. 922-933
-
-
Bawa, M.1
B Jr., R.J.2
Agrawal, R.3
-
27
-
-
0035517699
-
Protecting Respondents' Identities in Microdata Release
-
P. Samarati, "Protecting Respondents' Identities in Microdata Release," IEEE Transactions on Knowledge and Data Engineering, vol. 13, no. 6, pp. 1010-1027, 2001.
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
28
-
-
0036811662
-
k-Anonymity: A Model for Protecting Privacy
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
30
-
-
29844443821
-
Privacy Preserving OLAP
-
R. Agrawal, R. Srikant, and D. Thomas, "Privacy Preserving OLAP," in ACM Special Interest Group on Management of Data (SIGMOD), 2004, pp. 251-262.
-
ACM Special Interest Group on Management of Data (SIGMOD), 2004
, pp. 251-262
-
-
Agrawal, R.1
Srikant, R.2
Thomas, D.3
-
31
-
-
33244463520
-
Privacy-Enhancing k-Anonymization of Customer Data
-
S. Zhong, Z. Yang, and R. N. Wright, "Privacy-Enhancing k-Anonymization of Customer Data," in Symposium on Principles of Database Systems (PODS), 2005, pp. 139-147.
-
Symposium on Principles of Database Systems (PODS), 2005
, pp. 139-147
-
-
Zhong, S.1
Yang, Z.2
Wright, R.N.3
-
32
-
-
33749607006
-
L-Diversity: Privacy Beyond k-Anonymity
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, "L-Diversity: Privacy Beyond k-Anonymity," in IEEE International Conference on Data Engineering (ICDE), 2006, pp. 24-35.
-
IEEE International Conference on Data Engineering (ICDE), 2006
, pp. 24-35
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniam, M.4
-
34
-
-
35648982949
-
Preventing Location-Based Identity Inference in Anonymous Spatial Queries
-
P. Kalnis, G. Ghinita, K. Mouratidis, and D. Papadias, "Preventing Location-Based Identity Inference in Anonymous Spatial Queries," IEEE Transactions on Knowledge and Data Engineering, vol. 19, no. 12, pp. 1719-1733, 2007.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.12
, pp. 1719-1733
-
-
Kalnis, P.1
Ghinita, G.2
Mouratidis, K.3
Papadias, D.4
-
35
-
-
0002956175
-
A Method for Limiting Disclosure in Microdata based on Random Noise and Transformation
-
American Statistical Association
-
J. Kim, "A Method for Limiting Disclosure in Microdata based on Random Noise and Transformation," in Section on Survey Research Methods, American Statistical Association, 1986, pp. 303-308.
-
(1986)
Section on Survey Research Methods
, pp. 303-308
-
-
Kim, J.1
-
36
-
-
35048834229
-
On the Security of Noise Addition for Privacy in Statistical Databases
-
June
-
J. Domingo-Ferrer, F. Sebé, and J. Castell-Roca, "On the Security of Noise Addition for Privacy in Statistical Databases," in Privacy in Statistical Databases, June 2004, pp. 149-161.
-
(2004)
Privacy in Statistical Databases
, pp. 149-161
-
-
Domingo-Ferrer, J.1
Sebé, F.2
Castell-Roca, J.3
-
37
-
-
0001751897
-
Disclosure Limitation Methods and Information Loss for Tabular Data
-
P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz, Eds. Elsevier, pre-publication version available at
-
G. T. Duncan, S. E. Fienberg, R. Krishnan, R. Padman, and S. F. Roehrig, "Disclosure Limitation Methods and Information Loss for Tabular Data," in Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies, P. Doyle, J. Lane, J. Theeuwes, and L. Zayatz, Eds. Elsevier, 2001, pp. 135-166, pre-publication version available at http://www.niss.org/dg/TR/duncanlanechapter.pdf.
-
(2001)
Confidentiality, Disclosure and Data Access: Theory and Practical Applications for Statistical Agencies
, pp. 135-166
-
-
Duncan, G.T.1
Fienberg, S.E.2
Krishnan, R.3
Padman, R.4
Roehrig, S.F.5
-
38
-
-
0036563104
-
Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases
-
R. Gopal, R. Garfinkel, and P. Goes, "Confidentiality via Camouflage: The CVC Approach to Disclosure Limitation When Answering Queries to Databases," Operations Research, vol. 50, no. 3, pp. 501-516, 2002.
-
(2002)
Operations Research
, vol.50
, Issue.3
, pp. 501-516
-
-
Gopal, R.1
Garfinkel, R.2
Goes, P.3
-
39
-
-
33847045247
-
Minimizing Information Loss and Preserving Privacy
-
S. Menon and S. Sarkar, "Minimizing Information Loss and Preserving Privacy," Management Science, vol. 53, no. 1, pp. 101-116, 2007.
-
(2007)
Management Science
, vol.53
, Issue.1
, pp. 101-116
-
-
Menon, S.1
Sarkar, S.2
-
40
-
-
33749672242
-
A Data Disclosure Policy for Count Data Based on the COM-Poisson Distribution
-
J. B. Kadane, R. Krishnan, and G. Shmueli, "A Data Disclosure Policy for Count Data Based on the COM-Poisson Distribution," Management Science, vol. 52, no. 10, pp. 1610-1617, 2006.
-
(2006)
Management Science
, vol.52
, Issue.10
, pp. 1610-1617
-
-
Kadane, J.B.1
Krishnan, R.2
Shmueli, G.3
-
41
-
-
0038589165
-
The Anatomy of a Large-Scale Hypertextual Web Search Engine
-
S. Brin and L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 107-117, 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
42
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
September
-
J. M. Kleinberg, "Authoritative sources in a hyperlinked environment," Journal of the ACM, vol. 46, pp. 604-632, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, pp. 604-632
-
-
Kleinberg, J.M.1
-
45
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
D. L. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-90, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
46
-
-
0141607824
-
Latent Dirichlet Allocation
-
D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet Allocation," Journal of Machine Learning Research, vol. 3, pp. 993-1022, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 993-1022
-
-
Blei, D.M.1
Ng, A.Y.2
Jordan, M.I.3
-
47
-
-
1142263341
-
Limiting Privacy Breaches in Privacy Preserving Data Mining
-
A. Evfimievski, J. Gehrke, and R. Srikant, "Limiting Privacy Breaches in Privacy Preserving Data Mining," in Symposium on Principles of Database Systems (PODS), 2003, pp. 211-222.
-
Symposium on Principles of Database Systems (PODS), 2003
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
49
-
-
57349117605
-
Learning to Classify Short and Sparse Text & Web with Hidden Topics from Large-scale Data Collections
-
X.-H. Phan, L.-M. Nguyen, and S. Horiguchi, "Learning to Classify Short and Sparse Text & Web with Hidden Topics from Large-scale Data Collections," in International World Wide Web Conference (WWW), April 2008, pp. 91-100.
-
International World Wide Web Conference (WWW), April 2008
, pp. 91-100
-
-
Phan, X.-H.1
Nguyen, L.-M.2
Horiguchi, S.3
-
50
-
-
84989525001
-
Indexing by Latent Semantic Analysis
-
S. Deerwester, S. T. Dumais, G. W. Furnas, T. K. Landauer, and R. Harshman, "Indexing by Latent Semantic Analysis," Journal of American Society for Information Science, vol. 41, pp. 391-407, 1990.
-
(1990)
Journal of American Society for Information Science
, vol.41
, pp. 391-407
-
-
Deerwester, S.1
Dumais, S.T.2
Furnas, G.W.3
Landauer, T.K.4
Harshman, R.5
-
51
-
-
0006711389
-
-
Dept. of Computer Science, Duke University, Tech. Rep. CS-99-5, February
-
F. Jiang, R. Kannan, M. L. Littman, and S. Vempala, "Efficient Singular Value Decomposition via Improved Document Sampling," Dept. of Computer Science, Duke University, Tech. Rep. CS-99-5, February 1999.
-
(1999)
Efficient Singular Value Decomposition Via Improved Document Sampling
-
-
Jiang, F.1
Kannan, R.2
Littman, M.L.3
Vempala, S.4
|