메뉴 건너뛰기




Volumn 8134 LNCS, Issue , 2013, Pages 443-462

Privacy-preserving matching of community-contributed content

Author keywords

[No Author keywords available]

Indexed keywords

CONSUMER REVIEWS; CUSTOMIZED SERVICES; EXPERIMENTAL EVALUATION; GARBLED CIRCUITS; HIGHLY ACCURATE; HO-MOMORPHIC ENCRYPTIONS; PRIVACY PRESERVING; REVIEW CONTENTS;

EID: 84884750287     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40203-6_25     Document Type: Conference Paper
Times cited : (4)

References (51)
  • 1
    • 84885682738 scopus 로고    scopus 로고
    • Amazon, http://www.amazon.com
  • 2
    • 84885687723 scopus 로고    scopus 로고
    • Facebook, http://www.facebook.com
  • 4
    • 84885690594 scopus 로고    scopus 로고
    • Google+, https://plus.google.com
  • 5
    • 84885685503 scopus 로고    scopus 로고
    • Linkedin, http://www.linkedin.com
  • 6
    • 84885688906 scopus 로고    scopus 로고
    • TripAdvisor, http://www.tripadvisor.com
  • 7
    • 84885684872 scopus 로고    scopus 로고
    • Twitter, http://www.twitter.com
  • 8
    • 84885691144 scopus 로고    scopus 로고
    • Yelp, http://www.yelp.com
  • 12
    • 84865595447 scopus 로고    scopus 로고
    • Exploring linkability of user reviews
    • Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. Springer, Heidelberg
    • Almishari, M., Tsudik, G.: Exploring linkability of user reviews. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 307-324. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7459 , pp. 307-324
    • Almishari, M.1    Tsudik, G.2
  • 15
    • 80053027350 scopus 로고    scopus 로고
    • Secure and efficient protocols for iris and fingerprint identification
    • Atluri, V., Diaz, C. (eds.) ESORICS 2011. Springer, Heidelberg
    • Blanton, M., Gasti, P.: Secure and efficient protocols for iris and fingerprint identification. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 190-209. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6879 , pp. 190-209
    • Blanton, M.1    Gasti, P.2
  • 16
    • 84872732449 scopus 로고    scopus 로고
    • EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity
    • Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. Springer, Heidelberg
    • Blundo, C., De Cristofaro, E., Gasti, P.: EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds.) DPM 2012 and SETOP 2012. LNCS, vol. 7731, pp. 89-103. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7731 , pp. 89-103
    • Blundo, C.1    De Cristofaro, E.2    Gasti, P.3
  • 18
    • 74949095118 scopus 로고    scopus 로고
    • Practical Attacks Against Authorship Recognition Techniques
    • Brennan, M., Greenstadt, R.: Practical Attacks Against Authorship Recognition Techniques. In: IAAI (2009)
    • (2009) IAAI
    • Brennan, M.1    Greenstadt, R.2
  • 19
    • 84863382720 scopus 로고    scopus 로고
    • On the security of the "Free-XOR" technique
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the security of the "Free-XOR" technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39-53. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 39-53
    • Choi, S.G.1    Katz, J.2    Kumaresan, R.3    Zhou, H.-S.4
  • 20
    • 84945124606 scopus 로고    scopus 로고
    • Multiparty Computation from Threshold Homomorphic Encryption
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • Cramer, R., Damgård, I., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280-300. Springer, Heidelberg (2001) (Pubitemid 33275838)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2045 , pp. 280-300
    • Cramer, R.1    Damgard, I.2    Nielsen, J.B.3
  • 21
    • 84872740957 scopus 로고    scopus 로고
    • Fast and Private Computation of Cardinality of Set Intersection and Union
    • Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. Springer, Heidelberg
    • De Cristofaro, E., Gasti, P., Tsudik, G.: Fast and Private Computation of Cardinality of Set Intersection and Union. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 218-231. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7712 , pp. 218-231
    • De Cristofaro, E.1    Gasti, P.2    Tsudik, G.3
  • 24
    • 67049134126 scopus 로고    scopus 로고
    • Asynchronous multiparty computation: Theory and implementation
    • Jarecki, S., Tsudik, G. (eds.) PKC 2009. Springer, Heidelberg
    • Damgård, I., Geisler, M., Krøigaard, M., Nielsen, J.B.: Asynchronous multiparty computation: Theory and implementation. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 160-179. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5443 , pp. 160-179
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3    Nielsen, J.B.4
  • 25
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear complexity
    • Sion, R. (ed.) FC 2010. Springer, Heidelberg
    • De Cristofaro, E., Tsudik, G.: Practical private set intersection protocols with linear complexity. In: Sion, R. (ed.) FC 2010. LNCS, vol. 6052, pp. 143-159. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 26
    • 69949163699 scopus 로고    scopus 로고
    • Privacy-preserving face recognition
    • Goldberg, I., Atallah, M.J. (eds.) PETS 2009. Springer, Heidelberg
    • Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235-253. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5672 , pp. 235-253
    • Erkin, Z.1    Franz, M.2    Guajardo, J.3    Katzenbeisser, S.4    Lagendijk, I.5    Toft, T.6
  • 27
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 28
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: ACM Symposium on Theory of Computing, STOC, pp. 218-229 (1987)
    • (1987) ACM Symposium on Theory of Computing, STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 29
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 30
    • 79955547393 scopus 로고    scopus 로고
    • Efficient Set Operations in the Presence of Malicious Adversaries
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 33
    • 24144457853 scopus 로고    scopus 로고
    • Extending oblivious transfers efficiently
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145-161. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 145-161
    • Ishai, Y.1    Kilian, J.2    Nissim, K.3    Petrank, E.4
  • 34
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Fast secure computation of set intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 36
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 37
    • 71549170830 scopus 로고    scopus 로고
    • Improved garbled circuit building blocks and applications to auctions and computing minima
    • Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. Springer, Heidelberg
    • Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1-20. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5888 , pp. 1-20
    • Kolesnikov, V.1    Sadeghi, A.-R.2    Schneider, T.3
  • 38
    • 49049099825 scopus 로고    scopus 로고
    • Improved garbled circuit: Free XOR gates and applications
    • Aceto, L., Damgård, I., Goldberg, L.A., Halldo̊rsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. Springer, Heidelberg
    • Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldo̊rsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol. 5126, pp. 486-498. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5126 , pp. 486-498
    • Kolesnikov, V.1    Schneider, T.2
  • 39
    • 84957069091 scopus 로고    scopus 로고
    • Naive(bayes) at forty:The independence assumption in information retrieval
    • Nédellec, C., Rouveirol, C. (eds.) ECML 1998. Springer, Heidelberg
    • Lewis, D.D.: Naive(bayes) at forty:the independence assumption in information retrieval. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398, pp. 4-15. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1398 , pp. 4-15
    • Lewis, D.D.1
  • 40
    • 84859465169 scopus 로고    scopus 로고
    • Secure distributed computation of the square root and applications
    • Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. Springer, Heidelberg
    • Liedel, M.: Secure distributed computation of the square root and applications. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 277-288. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7232 , pp. 277-288
    • Liedel, M.1
  • 42
    • 84864225669 scopus 로고    scopus 로고
    • Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
    • Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. Springer, Heidelberg
    • McDonald, A.W.E., Afroz, S., Caliskan, A., Stolerman, A., Greenstadt, R.: Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization. In: Fischer-Hübner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 299-318. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7384 , pp. 299-318
    • McDonald, A.W.E.1    Afroz, S.2    Caliskan, A.3    Stolerman, A.4    Greenstadt, R.5
  • 44
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 45
    • 72449131818 scopus 로고    scopus 로고
    • Secure two-party computation is practical
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.P.3    Williams, S.C.4
  • 46
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: ACM Symposium on Theory of Computing, STOC, pp. 73-85 (1989)
    • (1989) ACM Symposium on Theory of Computing, STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 47
    • 77954610725 scopus 로고    scopus 로고
    • Efficient privacy-preserving face recognition
    • Lee, D., Hong, S. (eds.) ICISC 2009. Springer, Heidelberg
    • Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Efficient privacy-preserving face recognition. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 229-244. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.5984 , pp. 229-244
    • Sadeghi, A.-R.1    Schneider, T.2    Wehrenberg, I.3
  • 50
    • 84983470508 scopus 로고    scopus 로고
    • Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network
    • Toutanova, K., Klein, D., Manning, C., Singer, Y.: Feature-Rich Part-of-Speech Tagging with a Cyclic Dependency Network. In: HLT-NAACL (2003)
    • (2003) HLT-NAACL
    • Toutanova, K.1    Klein, D.2    Manning, C.3    Singer, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.