-
1
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
Atallah, M.J., Bykova, M., Li, J., Frikken, K.B., Topkara, M.: Private collaborative forecasting and benchmarking. In: WPES (2004)
-
(2004)
WPES
-
-
Atallah, M.J.1
Bykova, M.2
Li, J.3
Frikken, K.B.4
Topkara, M.5
-
2
-
-
78649955412
-
A lightweight privacy preserving sms-based recommendation system for mobile users
-
Baglioni, E., Becchetti, L., Bergamini, L., Colesanti, U., Filipponi, L., Vitaletti, A., Persiano, G.: A lightweight privacy preserving sms-based recommendation system for mobile users. In: RecSys (2010)
-
(2010)
RecSys
-
-
Baglioni, E.1
Becchetti, L.2
Bergamini, L.3
Colesanti, U.4
Filipponi, L.5
Vitaletti, A.6
Persiano, G.7
-
3
-
-
84872740752
-
-
Extended Version
-
Blundo, C., De Cristofaro, E., Gasti, P.: EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity, Extended Version (2012), http://arxiv.org/abs/1111.5062
-
(2012)
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
-
-
Blundo, C.1
De Cristofaro, E.2
Gasti, P.3
-
5
-
-
0031620041
-
Min-wise independent permutations
-
Broder, A., Charikar, M., Frieze, A., Mitzenmacher, M.: Min-wise independent permutations. In: STOC (1998)
-
(1998)
STOC
-
-
Broder, A.1
Charikar, M.2
Frieze, A.3
Mitzenmacher, M.4
-
6
-
-
74049103179
-
Secure two-party k-means clustering
-
Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: CCS (2007)
-
(2007)
CCS
-
-
Bunn, P.1
Ostrovsky, R.2
-
7
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. The Annals of Mathematical Statistics (1952)
-
(1952)
The Annals of Mathematical Statistics
-
-
Chernoff, H.1
-
8
-
-
84872733479
-
-
Cornell Univ. KDDCUP Dataset, http://www.cs.cornell.edu/projects/kddcup/ datasets.html
-
KDDCUP Dataset
-
-
-
11
-
-
0034130242
-
Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources
-
Dombek, P., Johnson, L., Zimmerley, S., Sadowsky, M.: Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources. Applied and Environmental Microbiology 66(6) (2000)
-
(2000)
Applied and Environmental Microbiology
, vol.66
, Issue.6
-
-
Dombek, P.1
Johnson, L.2
Zimmerley, S.3
Sadowsky, M.4
-
12
-
-
79952168702
-
Correlated genotypes in friendship networks
-
Fowler, J., Settle, J., Christakis, N.: Correlated genotypes in friendship networks. Proceedings of the National Academy of Sciences 108(5) (2011)
-
(2011)
Proceedings of the National Academy of Sciences
, vol.108
, Issue.5
-
-
Fowler, J.1
Settle, J.2
Christakis, N.3
-
13
-
-
35048820609
-
Efficient Private Matching and Set Intersection
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
16
-
-
52649171325
-
Similar document detection with limited information disclosure
-
Jiang, W., Murugesan, M., Clifton, C., Si, L.: Similar document detection with limited information disclosure. In: ICDE (2008)
-
(2008)
ICDE
-
-
Jiang, W.1
Murugesan, M.2
Clifton, C.3
Si, L.4
-
17
-
-
79960218384
-
N-Gram Based Secure Similar Document Detection
-
Li, Y. (ed.) DBSec 2011. Springer, Heidelberg
-
Jiang, W., Samanthula, B.K.: N-Gram Based Secure Similar Document Detection. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 239-246. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6818
, pp. 239-246
-
-
Jiang, W.1
Samanthula, B.K.2
-
18
-
-
84862931542
-
An efficient approximate protocol for privacy-preserving association rule mining
-
Kantarcioglu, M., Nix, R., Vaidya, J.: An efficient approximate protocol for privacy-preserving association rule mining. In: KDD (2009)
-
(2009)
KDD
-
-
Kantarcioglu, M.1
Nix, R.2
Vaidya, J.3
-
19
-
-
84871965745
-
Outsourced Private Set Intersection Using Homomorphic Encryption
-
Kerschbaum, F.: Outsourced Private Set Intersection Using Homomorphic Encryption. In: AsiaCCS (2012)
-
(2012)
AsiaCCS
-
-
Kerschbaum, F.1
-
20
-
-
33745160750
-
Privacy-Preserving Set Operations
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
21
-
-
0345058962
-
Verifiable Homomorphic Oblivious Transfer and Private Equality Test
-
Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
-
Lipmaa, H.: Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416-433. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 416-433
-
-
Lipmaa, H.1
-
22
-
-
85043988965
-
Finding similar files in a large file system
-
Manber, U.: Finding similar files in a large file system. In: USENIX (1994)
-
(1994)
USENIX
-
-
Manber, U.1
-
23
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
August
-
Murugesan, M., Jiang, W., Clifton, C., Si, L., Vaidya, J.: Efficient privacy-preserving similar document detection. The VLDB Journal 19 (August 2010)
-
(2010)
The VLDB Journal
, vol.19
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
25
-
-
84942550998
-
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
27
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
Ravikumar, P., Cohen, W., Fienberg, S.: A secure protocol for computing string distance metrics. In: PSDM (2004)
-
(2004)
PSDM
-
-
Ravikumar, P.1
Cohen, W.2
Fienberg, S.3
-
28
-
-
77951113914
-
A privacy preserving jaccard similarity function for mining encrypted data
-
Singh, M., Krishna, P., Saxena, A.: A privacy preserving jaccard similarity function for mining encrypted data. In: TENCON (2009)
-
(2009)
TENCON
-
-
Singh, M.1
Krishna, P.2
Saxena, A.3
-
29
-
-
70449467722
-
Impact of similarity measures on web-page clustering
-
Strehl, A., Ghosh, J., Mooney, R.: Impact of similarity measures on web-page clustering. In: AAAI (2000)
-
(2000)
AAAI
-
-
Strehl, A.1
Ghosh, J.2
Mooney, R.3
-
31
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security 13(4) (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
-
-
Vaidya, J.1
Clifton, C.2
-
32
-
-
66249113620
-
Efficient similarity joins for near duplicate detection
-
Xiao, C., Wang, W., Lin, X., Yu, J.: Efficient similarity joins for near duplicate detection. In: WWW(2008)
-
(2008)
WWW
-
-
Xiao, C.1
Wang, W.2
Lin, X.3
Yu, J.4
|