-
5
-
-
81055138684
-
-
The McKinsey Global Institute, Tech. Rep., May
-
J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs, C. Roxburgh, and A. H. Byers, "Big data: The next frontier for innovation, competition, and productivity," The McKinsey Global Institute, Tech. Rep., May 2011.
-
(2011)
Big Data: The Next Frontier for Innovation, Competition, and Productivity
-
-
Manyika, J.1
Chui, M.2
Brown, B.3
Bughin, J.4
Dobbs, R.5
Roxburgh, C.6
Byers, A.H.7
-
6
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputation-based approach for choosing reliable resources in peer-to-peer networks," in Proceedings of the ACM Conference on Computer and Communications Security, 2002, pp. 207-216.
-
(2002)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
7
-
-
74049152229
-
A verifiable, centralized, coercion-free reputation system
-
F. Kerschbaum, "A verifiable, centralized, coercion-free reputation system," in Proc. of the 8th ACM workshop on privacy in the e-society (WPES'09), 2009, pp. 61-70.
-
(2009)
Proc. of the 8th ACM Workshop on Privacy in the E-society (WPES'09)
, pp. 61-70
-
-
Kerschbaum, F.1
-
8
-
-
77955310186
-
Signatures of reputation: Towards trust without identity
-
J. Bethencourt, E. Shi, and D. Song, "Signatures of reputation: Towards trust without identity," in Proc. of the Intl. Conf. on Financial Cryptography (FC '10), 2010, pp. 400-407.
-
(2010)
Proc. of the Intl. Conf. on Financial Cryptography (FC '10)
, pp. 400-407
-
-
Bethencourt, J.1
Shi, E.2
Song, D.3
-
9
-
-
84878317910
-
A decentralized privacy preserving reputation protocol for the malicious adversarial model
-
DOI: 10.1109/TIFS.2013.2258914
-
O. Hasan, L. Brunie, E. Bertino, and N. Shang, "A decentralized privacy preserving reputation protocol for the malicious adversarial model," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. DOI: 10.1109/TIFS.2013.2258914, 2013.
-
(2013)
IEEE TRANSACTIONS on INFORMATIon FORENSICS and SECURITY
-
-
Hasan, O.1
Brunie, L.2
Bertino, E.3
Shang, N.4
-
10
-
-
84867399725
-
Preserving privacy of feedback providers in decentralized reputation systems
-
October
-
O. Hasan, L. Brunie, and E. Bertino, "Preserving privacy of feedback providers in decentralized reputation systems," Computers & Security, vol. 31, no. 7, pp. 816-826, October 2012, http://dx.doi.org/10.1016/j.cose. 2011.12.003.
-
(2012)
Computers & Security
, vol.31
, Issue.7
, pp. 816-826
-
-
Hasan, O.1
Brunie, L.2
Bertino, E.3
-
11
-
-
33746335051
-
Differential privacy
-
M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds.Springer
-
C. Dwork, "Differential privacy," in ICALP (2), ser. Lecture Notes in Computer Science, M. Bugliesi, B. Preneel, V. Sassone, and I. Wegener, Eds., vol. 4052. Springer, 2006, pp. 1-12.
-
(2006)
ICALP (2), Ser. Lecture Notes in Computer Science
, vol.4052
, pp. 1-12
-
-
Dwork, C.1
-
12
-
-
79953250055
-
Evaluating laplace noise addition to satisfy differential privacy for numeric data
-
Apr
-
R. Sarathy and K. Muralidhar, "Evaluating Laplace Noise Addition to Satisfy Differential Privacy for Numeric Data," Transactions on Data Privacy, vol. 4, no. 1, pp. 1-17, Apr. 2011.
-
(2011)
Transactions on Data Privacy
, vol.4
, Issue.1
, pp. 1-17
-
-
Sarathy, R.1
Muralidhar, K.2
-
13
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Oct
-
L. Sweeney, "k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557-570, Oct. 2002.
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
14
-
-
0038589165
-
The anatomy of a large-scale hypertextual Web search engine
-
S. Brin and L. Page, "The anatomy of a large-scale hypertextual Web search engine," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 107-117, 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
18
-
-
80155135788
-
Pistis: A privacy-preserving content recommender system for online social communities
-
IEEE, Aug
-
D. Li, Q. Lv, H. Xia, L. Shang, T. Lu, and N. Gu, "Pistis: A Privacy-Preserving Content Recommender System for Online Social Communities," in 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, vol. 1. IEEE, Aug. 2011, pp. 79-86.
-
(2011)
2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology
, vol.1
, pp. 79-86
-
-
Li, D.1
Lv, Q.2
Xia, H.3
Shang, L.4
Lu, T.5
Gu, N.6
-
19
-
-
84886049577
-
-
INRIA, Rennes, Tech. Rep. February
-
A. Boutet, D. Frey, A. Jegou, and A.-m. Kermarrec, "Privacy- Preserving Distributed Collaborative Filtering," INRIA, Rennes, Tech. Rep. February, 2013.
-
(2013)
Privacy-Preserving Distributed Collaborative Filtering
-
-
Boutet, A.1
Frey, D.2
Jegou, A.3
Kermarrec, A.-M.4
|