메뉴 건너뛰기




Volumn 8, Issue 2, 2013, Pages 402-413

Privacy preserving data sharing with anonymous ID assignment

Author keywords

Anonymization and deanonymization; Cloud and distributed computing systems; Multiparty computation; Privacy preserving data mining; Privacy protection; Security and trust in cooperative communications

Indexed keywords

ANONYMIZATION; DISTRIBUTED COMPUTING SYSTEMS; MULTIPARTY COMPUTATION; PRIVACY PRESERVING DATA MINING; PRIVACY PROTECTION;

EID: 84872696068     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2235831     Document Type: Article
Times cited : (64)

References (42)
  • 3
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 4
    • 45749151381 scopus 로고    scopus 로고
    • Providing k-anonymity in data mining
    • Jul
    • A. Friedman, R. Wolff, and A. Schuster, "Providing k-anonymity in data mining," VLDB Journal, vol. 17, no. 4, pp. 789-804, Jul. 2008.
    • (2008) VLDB Journal , vol.17 , Issue.4 , pp. 789-804
    • Friedman, A.1    Wolff, R.2    Schuster, A.3
  • 5
    • 28044462690 scopus 로고    scopus 로고
    • SEAS, a secure e-voting protocol: Design and implementation
    • DOI 10.1016/j.cose.2005.07.008, PII S0167404805001100
    • F. Baiardi, A. Falleni, R. Granchi, F. Martinelli, M. Petrocchi, and A. Vaccarelli, "Seas, a secure e-voting protocol: Design and implementation," Comput. Security, vol. 24, no. 8, pp. 642-652, Nov. 2005. (Pubitemid 41690977)
    • (2005) Computers and Security , vol.24 , Issue.8 , pp. 642-652
    • Baiardi, F.1    Falleni, A.2    Granchi, R.3    Martinelli, F.4    Petrocchi, M.5    Vaccarelli, A.6
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • DOI 10.1145/358549.358563
    • D. Chaum, "Untraceable electronic mail, return address and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum David, L.1
  • 7
    • 80052099590 scopus 로고    scopus 로고
    • Privacy-preserving matchmaking for mobile social networking secure against malicious users
    • Jul.
    • Q. Xie and U. Hengartner, "Privacy-preserving matchmaking for mobile social networking secure against malicious users," in Proc. 9th Ann. IEEE Conf. Privacy, Security and Trust, Jul. 2011, pp. 252-259.
    • (2011) Proc. 9th Ann. IEEE Conf. Privacy, Security and Trust , pp. 252-259
    • Xie, Q.1    Hengartner, U.2
  • 12
    • 0033101103 scopus 로고    scopus 로고
    • Distributing identity [symmetry breaking distributed access protocols]
    • Mar
    • J. Smith, "Distributing identity [symmetry breaking distributed access protocols]," IEEE Robot. Autom. Mag., vol. 6, no. 1, pp. 49-56, Mar. 1999.
    • (1999) IEEE Robot. Autom. Mag. , vol.6 , Issue.1 , pp. 49-56
    • Smith, J.1
  • 13
    • 65549142682 scopus 로고    scopus 로고
    • Privacy and anonymity protection in computational grid services
    • Jan
    • D. Jana, A. Chaudhuri, and B. B. Bhaumik, "Privacy and anonymity protection in computational grid services," Int. J. Comput. Sci. Applicat., vol. 6, no. 1, pp. 98-107, Jan. 2009.
    • (2009) Int. J. Comput. Sci. Applicat. , vol.6 , Issue.1 , pp. 98-107
    • Jana, D.1    Chaudhuri, A.2    Bhaumik, B.B.3
  • 17
    • 84872742833 scopus 로고    scopus 로고
    • Secure statistical analysis of distributed databases, emphasizing what we don't know
    • A. Karr, "Secure statistical analysis of distributed databases, emphasizing what we don't know," J. Privacy Confidentiality, vol. 1, no. 2, pp. 197-211, 2009.
    • (2009) J. Privacy Confidentiality , vol.1 , Issue.2 , pp. 197-211
    • Karr, A.1
  • 18
    • 84944076702 scopus 로고
    • Local and global properties in networks of processors (extended abstract)
    • New York
    • D.Angluin, "Local and global properties in networks of processors (extended abstract)," in Proc. 12th Ann. ACM Symp. Theory of Computing (STOC '80), New York, 1980, pp. 82-93.
    • (1980) Proc. 12th Ann. ACM Symp. Theory of Computing (STOC '80) , pp. 82-93
    • Angluin, D.1
  • 19
    • 33748801791 scopus 로고    scopus 로고
    • Variations on Itai-Rodeh leader election for anonymous rings and their analysis in PRISM
    • W. Fokkink and J. Pang, "Variations on itai-rodeh leader election for anonymous rings and their analysis in prism," J. Universal Comput. Sci., vol. 12, no. 8, pp. 981-1006, Aug. 2006. (Pubitemid 44413382)
    • (2006) Journal of Universal Computer Science , vol.12 , Issue.8 , pp. 981-1006
    • Fokkink, W.1    Pang, J.2
  • 21
    • 79959543812 scopus 로고    scopus 로고
    • A perfect collision-free pseudonym system
    • Jun.
    • J.W. Yoon and H. Kim, "A perfect collision-free pseudonym system," IEEE Commun. Lett., vol. 15, no. 6, pp. 686-688, Jun. 2011.
    • (2011) IEEE Commun. Lett. , vol.15 , Issue.6 , pp. 686-688
    • Yoon, J.W.1    Kim, H.2
  • 24
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • R. Canetti, "Security and composition of multi-party cryptographic protocols," J. Cryptol., vol. 13, no. 1, pp. 143-202, 2000.
    • (2000) J. Cryptol. , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 29
  • 30
    • 0040891696 scopus 로고
    • A proof of Newton's power sum formulas
    • Apr
    • J. A. Eidswick, "A proof of Newton's power sum formulas," Amer. Math. Monthly, vol. 75, no. 4, pp. 396-396, Apr. 1968.
    • (1968) Amer. Math. Monthly , vol.75 , Issue.4 , pp. 396-396
    • Eidswick, J.A.1
  • 31
    • 21144482709 scopus 로고
    • Newton's identities
    • Oct
    • D. G. Mead, "Newton's identities," Amer. Math. Monthly, vol. 99, no. 8, pp. 749-749, Oct. 1992.
    • (1992) Amer. Math. Monthly , vol.99 , Issue.8 , pp. 749-749
    • Mead, D.G.1
  • 34
    • 60549110736 scopus 로고    scopus 로고
    • Chapter 11:Markov chains
    • 2nd ed. Providence, RI: Amer. Math. Society
    • C. M. Grinstead and J. L. Snell, "Chapter 11:Markov chains," in Introduction to Probability, 2nd ed. Providence, RI: Amer. Math. Society, 1997, pp. 510-510.
    • (1997) Introduction to Probability , pp. 510-510
    • Grinstead, C.M.1    Snell, J.L.2
  • 35
    • 85012865275 scopus 로고
    • Bounds for transient characteristics of Markov chains with large or infinite state spaces
    • Raleigh, NC, Jan. 8-10, 1990, Numerical Solution ofMarkov Chains, W. J. Stewart, Ed. New York: Marcel Dekker
    • P.-J. Courtois and P. Semal, "Bounds for transient characteristics of Markov chains with large or infinite state spaces," in Proc. First Int. Conf. Numerical Solutions of Markov Chains, Raleigh, NC, Jan. 8-10, 1990, Numerical Solution ofMarkov Chains, W. J. Stewart, Ed. New York: Marcel Dekker, 1991, pp. 413-434.
    • (1991) Proc. First Int. Conf. Numerical Solutions of Markov Chains , pp. 413-434
    • Courtois, P.-J.1    Semal, P.2
  • 36
    • 0003687683 scopus 로고
    • Translated From the Russian by E. Seneta. Groningen: Wolters-Noordhoff
    • V. I. Romanovskii, DiscreteMarkov Chains. Translated From the Russian by E. Seneta. Groningen: Wolters-Noordhoff, 1970.
    • (1970) DiscreteMarkov Chains
    • Romanovskii, V.I.1
  • 38
    • 84958626761 scopus 로고    scopus 로고
    • Deniable encryption
    • Advances in Cryptology - CRYPTO '97
    • R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, "Deniable encryption," in CRYPTO, ser. Lecture Notes in Computer Science, B. S. K. Jr., Ed. New York: Springer, 1997, vol. 1294, pp. 90-104. (Pubitemid 127112546)
    • (1997) Lecture notes in computer science , Issue.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 39
    • 84968518238 scopus 로고
    • Factoring polynomials over large finite fields
    • Sep
    • E. R. Berlekamp, "Factoring polynomials over large finite fields," Math. Computat., vol. 24, no. 111, pp. 713-713, Sep. 1970.
    • (1970) Math. Computat. , vol.24 , Issue.111 , pp. 713-713
    • Berlekamp, E.R.1
  • 40
    • 84966220369 scopus 로고
    • A new algorithm for factoring polynomials over finite fields
    • May
    • D. G. Cantor and H. Zassenhaus, "A new algorithm for factoring polynomials over finite fields," Math. Computat., vol. 36, no. 154, pp. 587-592, May 1981.
    • (1981) Math. Computat. , vol.36 , Issue.154 , pp. 587-592
    • Cantor, D.G.1    Zassenhaus, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.