메뉴 건너뛰기




Volumn 7731 LNCS, Issue , 2013, Pages 89-103

EsPRESSo: Efficient privacy-preserving evaluation of sample set similarity

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC AUTHENTICATION; CRYPTOGRAPHIC TECHNIQUES; DIGITAL SOCIETY; DOCUMENT SIMILARITY; ELECTRONIC INFORMATION; GENETIC TESTS; INFORMATION SET; INFORMATION SHARING; JACCARD INDEX; MULTIMEDIA FILES; PRIVACY CONCERNS; PRIVACY PRESERVING; RESEARCH COMMUNITIES; SAMPLE SETS; SIMILARITY INDICES;

EID: 84872732449     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-35890-6_7     Document Type: Conference Paper
Times cited : (36)

References (32)
  • 6
    • 74049103179 scopus 로고    scopus 로고
    • Secure two-party k-means clustering
    • Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: CCS (2007)
    • (2007) CCS
    • Bunn, P.1    Ostrovsky, R.2
  • 7
    • 0000182415 scopus 로고
    • A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. The Annals of Mathematical Statistics (1952)
    • (1952) The Annals of Mathematical Statistics
    • Chernoff, H.1
  • 8
    • 84872733479 scopus 로고    scopus 로고
    • Cornell Univ. KDDCUP Dataset, http://www.cs.cornell.edu/projects/kddcup/ datasets.html
    • KDDCUP Dataset
  • 11
    • 0034130242 scopus 로고    scopus 로고
    • Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources
    • Dombek, P., Johnson, L., Zimmerley, S., Sadowsky, M.: Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources. Applied and Environmental Microbiology 66(6) (2000)
    • (2000) Applied and Environmental Microbiology , vol.66 , Issue.6
    • Dombek, P.1    Johnson, L.2    Zimmerley, S.3    Sadowsky, M.4
  • 13
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 16
    • 52649171325 scopus 로고    scopus 로고
    • Similar document detection with limited information disclosure
    • Jiang, W., Murugesan, M., Clifton, C., Si, L.: Similar document detection with limited information disclosure. In: ICDE (2008)
    • (2008) ICDE
    • Jiang, W.1    Murugesan, M.2    Clifton, C.3    Si, L.4
  • 17
    • 79960218384 scopus 로고    scopus 로고
    • N-Gram Based Secure Similar Document Detection
    • Li, Y. (ed.) DBSec 2011. Springer, Heidelberg
    • Jiang, W., Samanthula, B.K.: N-Gram Based Secure Similar Document Detection. In: Li, Y. (ed.) DBSec 2011. LNCS, vol. 6818, pp. 239-246. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6818 , pp. 239-246
    • Jiang, W.1    Samanthula, B.K.2
  • 18
    • 84862931542 scopus 로고    scopus 로고
    • An efficient approximate protocol for privacy-preserving association rule mining
    • Kantarcioglu, M., Nix, R., Vaidya, J.: An efficient approximate protocol for privacy-preserving association rule mining. In: KDD (2009)
    • (2009) KDD
    • Kantarcioglu, M.1    Nix, R.2    Vaidya, J.3
  • 19
    • 84871965745 scopus 로고    scopus 로고
    • Outsourced Private Set Intersection Using Homomorphic Encryption
    • Kerschbaum, F.: Outsourced Private Set Intersection Using Homomorphic Encryption. In: AsiaCCS (2012)
    • (2012) AsiaCCS
    • Kerschbaum, F.1
  • 20
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 21
    • 0345058962 scopus 로고    scopus 로고
    • Verifiable Homomorphic Oblivious Transfer and Private Equality Test
    • Laih, C.-S. (ed.) ASIACRYPT 2003. Springer, Heidelberg
    • Lipmaa, H.: Verifiable Homomorphic Oblivious Transfer and Private Equality Test. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 416-433. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 416-433
    • Lipmaa, H.1
  • 22
    • 85043988965 scopus 로고
    • Finding similar files in a large file system
    • Manber, U.: Finding similar files in a large file system. In: USENIX (1994)
    • (1994) USENIX
    • Manber, U.1
  • 25
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 27
    • 33751069306 scopus 로고    scopus 로고
    • A secure protocol for computing string distance metrics
    • Ravikumar, P., Cohen, W., Fienberg, S.: A secure protocol for computing string distance metrics. In: PSDM (2004)
    • (2004) PSDM
    • Ravikumar, P.1    Cohen, W.2    Fienberg, S.3
  • 28
    • 77951113914 scopus 로고    scopus 로고
    • A privacy preserving jaccard similarity function for mining encrypted data
    • Singh, M., Krishna, P., Saxena, A.: A privacy preserving jaccard similarity function for mining encrypted data. In: TENCON (2009)
    • (2009) TENCON
    • Singh, M.1    Krishna, P.2    Saxena, A.3
  • 29
    • 70449467722 scopus 로고    scopus 로고
    • Impact of similarity measures on web-page clustering
    • Strehl, A., Ghosh, J., Mooney, R.: Impact of similarity measures on web-page clustering. In: AAAI (2000)
    • (2000) AAAI
    • Strehl, A.1    Ghosh, J.2    Mooney, R.3
  • 31
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security 13(4) (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.4
    • Vaidya, J.1    Clifton, C.2
  • 32
    • 66249113620 scopus 로고    scopus 로고
    • Efficient similarity joins for near duplicate detection
    • Xiao, C., Wang, W., Lin, X., Yu, J.: Efficient similarity joins for near duplicate detection. In: WWW(2008)
    • (2008) WWW
    • Xiao, C.1    Wang, W.2    Lin, X.3    Yu, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.