-
1
-
-
53449102514
-
ALAMBIC: A privacy-preserving recommender system for electronic commerce
-
E. Aïmeur, G. Brassard, J. M. Fernandez, and F. S. M. Onana. ALAMBIC: A privacy-preserving recommender system for electronic commerce. Int. J. Inf. Sec., 7(5), 2008.
-
(2008)
Int. J. Inf. Sec.
, vol.7
, Issue.5
-
-
Aïmeur, E.1
Brassard, G.2
Fernandez, J.M.3
Onana, F.S.M.4
-
4
-
-
0141911095
-
Non-interactive oblivious transfer and applications
-
M. Bellare and S. Micali. Non-interactive oblivious transfer and applications. In CRYPTO, 1990.
-
(1990)
CRYPTO
-
-
Bellare, M.1
Micali, S.2
-
6
-
-
84889068201
-
Collaborative filtering with privacy
-
J. F. Canny. Collaborative filtering with privacy. In IEEE S&P, 2002.
-
(2002)
IEEE S&P
-
-
Canny, J.F.1
-
9
-
-
0004116989
-
-
MIT Press, 2nd edition
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, 2nd edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
10
-
-
84883319687
-
Trading sugar beet quotas - secure multiparty computation in practice
-
I. Damgård and T. Toft. Trading sugar beet quotas - secure multiparty computation in practice. ERCIM News, 2008.
-
(2008)
ERCIM News
-
-
Damgård, I.1
Toft, T.2
-
11
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
W. Du and M. J. Atallah. Secure multi-party computation problems and their applications: A review and open problems. In New Security Paradigms Workshop, 2001.
-
New Security Paradigms Workshop, 2001
-
-
Du, W.1
Atallah, M.J.2
-
12
-
-
50249086141
-
Differential privacy
-
C. Dwork. Differential privacy. In ICALP, 2006.
-
(2006)
ICALP
-
-
Dwork, C.1
-
13
-
-
84889052942
-
Privacy-preserving data-oblivious geometric algorithms for geographic data
-
D. Eppstein, M. T. Goodrich, and R. Tamassia. Privacy-preserving data-oblivious geometric algorithms for geographic data. In 18th SIGSPATIAL, 2010.
-
(2010)
18th SIGSPATIAL
-
-
Eppstein, D.1
Goodrich, M.T.2
Tamassia, R.3
-
14
-
-
0022080529
-
A randomized protocol for signing contracts
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Commun. ACM, 28(6), 1985.
-
(1985)
Commun. ACM
, vol.28
, Issue.6
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
15
-
-
0003684449
-
-
Springer, 2nd edition
-
J. Friedman, T. Hastie, and R. Tibshirani. The Elements of Statistical Learning: Data Mining, Inference and Prediction. Springer, 2nd edition, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference and Prediction
-
-
Friedman, J.1
Hastie, T.2
Tibshirani, R.3
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
-
(2009)
STOC
-
-
Gentry, C.1
-
18
-
-
77951692170
-
Randomized shellsort: A simple oblivious sorting algorithm
-
M. T. Goodrich. Randomized shellsort: A simple oblivious sorting algorithm. In SODA, 2010.
-
(2010)
SODA
-
-
Goodrich, M.T.1
-
19
-
-
79959681766
-
Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data
-
M. T. Goodrich. Data-oblivious external-memory algorithms for the compaction, selection, and sorting of outsourced data. In SPAA, 2011.
-
(2011)
SPAA
-
-
Goodrich, M.T.1
-
21
-
-
80955145180
-
Secure multiple linear regression based on homomorphic encryption
-
R. Hall, S. E. Fienberg, and Y. Nardi. Secure multiple linear regression based on homomorphic encryption. J. Official Statistics, 2011.
-
(2011)
J. Official Statistics
-
-
Hall, R.1
Fienberg, S.E.2
Nardi, Y.3
-
22
-
-
84889004576
-
Practically efficient multi-party sorting protocols from comparison sort algorithms
-
K. Hamada, R. Kikuchi, D. Ikarashi, K. Chida, and K. Takahashi. Practically efficient multi-party sorting protocols from comparison sort algorithms. In ICISC, 2013.
-
(2013)
ICISC
-
-
Hamada, K.1
Kikuchi, R.2
Ikarashi, D.3
Chida, K.4
Takahashi, K.5
-
23
-
-
78649992236
-
TASTY: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. TASTY: Tool for automating secure two-party computations. In CCS, 2010.
-
(2010)
CCS
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
25
-
-
84889064808
-
Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution
-
Y. Huang, J. Katz, and D. Evans. Quid-pro-quo-tocols: Strengthening semi-honest protocols with dual execution. In IEEE S&P, 2012.
-
(2012)
IEEE S&P
-
-
Huang, Y.1
Katz, J.2
Evans, D.3
-
26
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In NDSS, 2011.
-
(2011)
NDSS
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
29
-
-
34548082549
-
Secure, privacy-preserving analysis of distributed databases
-
A. F. Karr, W. J. Fulp, F. Vera, S. S. Young, X. Lin, and J. P. Reiter. Secure, privacy-preserving analysis of distributed databases. Technometrics, 2007.
-
(2007)
Technometrics
-
-
Karr, A.F.1
Fulp, W.J.2
Vera, F.3
Young, S.S.4
Lin, X.5
Reiter, J.P.6
-
30
-
-
77349092141
-
Privacy-preserving analysis of vertically partitioned data using secure matrix products
-
A. F. Karr, X. Lin, A. P. Sanil, and J. P. Reiter. Privacy-preserving analysis of vertically partitioned data using secure matrix products. J. Official Statistics, 2009.
-
(2009)
J. Official Statistics
-
-
Karr, A.F.1
Lin, X.2
Sanil, A.P.3
Reiter, J.P.4
-
32
-
-
0000811402
-
Sorting and Searching
-
Addison-Wesley, 2nd edition
-
D. E. Knuth. The Art Of Computer Programming - Volume 3 / Sorting and Searching. Addison-Wesley, 2nd edition, 1998.
-
(1998)
The Art of Computer Programming
, vol.3
-
-
Knuth, D.E.1
-
33
-
-
84869443834
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, 2009.
-
(2009)
CANS
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
34
-
-
78149254461
-
Improved garbled circuit: Free XOR gates and applications
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free XOR gates and applications. In ICALP, 2008.
-
(2008)
ICALP
-
-
Kolesnikov, V.1
Schneider, T.2
-
35
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
Y. Koren, R. M. Bell, and C. Volinsky. Matrix factorization techniques for recommender systems. IEEE Computer, 2009.
-
(2009)
IEEE Computer
-
-
Koren, Y.1
Bell, R.M.2
Volinsky, C.3
-
36
-
-
84889076745
-
Billion-gate secure computation with malicious adversaries
-
B. Kreuter, A. Shelat, and C.-H. Shen. Billion-gate secure computation with malicious adversaries. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Kreuter, B.1
Shelat, A.2
Shen, C.-H.3
-
37
-
-
38849180269
-
Do you trust your recommendations? An exploration of security and privacy issues in recommender systems
-
S. K. Lam, D. Frankowski, and J. Riedl. Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. In ETRICS 2006, 2006.
-
(2006)
ETRICS 2006
-
-
Lam, S.K.1
Frankowski, D.2
Riedl, J.3
-
38
-
-
19944368437
-
Shilling recommender systems for fun and profit
-
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In WWW, 2004.
-
(2004)
WWW
-
-
Lam, S.K.1
Riedl, J.2
-
40
-
-
84893321220
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Y. Lindell. Fast cut-and-choose based protocols for malicious and covert adversaries. IACR Cryptology ePrint Archive, 2013.
-
(2013)
IACR Cryptology ePrint Archive
-
-
Lindell, Y.1
-
42
-
-
64249101946
-
A proof of security of Yao's protocol for two-party computation
-
Y. Lindell and B. Pinkas. A proof of security of Yao's protocol for two-party computation. J. Cryptology, 2009.
-
(2009)
J. Cryptology
-
-
Lindell, Y.1
Pinkas, B.2
-
43
-
-
84869506354
-
Secure two-party computation via cut-and-choose oblivious transfer
-
Y. Lindell and B. Pinkas. Secure two-party computation via cut-and-choose oblivious transfer. J. Cryptology, 2012.
-
(2012)
J. Cryptology
-
-
Lindell, Y.1
Pinkas, B.2
-
44
-
-
52149120767
-
Implementing two-party computation efficiently with security against malicious adversaries
-
Y. Lindell, B. Pinkas, and N. P. Smart. Implementing two-party computation efficiently with security against malicious adversaries. In SCN, 2008.
-
(2008)
SCN
-
-
Lindell, Y.1
Pinkas, B.2
Smart, N.P.3
-
46
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the Netflix prize contenders
-
F. McSherry and I. Mironov. Differentially private recommender systems: Building privacy into the Netflix prize contenders. In KDD, 2009.
-
(2009)
KDD
-
-
McSherry, F.1
Mironov, I.2
-
47
-
-
35348969366
-
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
-
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Internet Techn., 7(4), 2007.
-
(2007)
ACM Trans. Internet Techn.
, vol.7
, Issue.4
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Williams, C.4
-
49
-
-
84876190311
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Narayanan, A.1
Shmatikov, V.2
-
50
-
-
84889051408
-
Privacy-preserving ridge regression on hundreds of millions of records
-
V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft. Privacy-preserving ridge regression on hundreds of millions of records. In IEEE S&P, 2013.
-
(2013)
IEEE S&P
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
51
-
-
84889020434
-
Communication efficient secure linear algebra
-
K. Nissim and E. Weinreb. Communication efficient secure linear algebra. In TCC, 2006.
-
(2006)
TCC
-
-
Nissim, K.1
Weinreb, E.2
-
52
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
54
-
-
0018456413
-
Relations among complexity measures
-
N. Pippenger and M. J. Fischer. Relations among complexity measures. J. ACM, 26(2), 1979.
-
(1979)
J. ACM
, vol.26
, Issue.2
-
-
Pippenger, N.1
Fischer, M.J.2
-
55
-
-
0003462641
-
-
Technical Report TR-81, Aiken Computation Laboratory, Harvard University
-
M. O. Rabin. How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University, 1981.
-
(1981)
How to Exchange Secrets by Oblivious Transfer
-
-
Rabin, M.O.1
-
56
-
-
70349309809
-
On lattices, learning with errors, random linear codes, and cryptography
-
O. Regev. On lattices, learning with errors, random linear codes, and cryptography. J. ACM, 56(6), 2009.
-
(2009)
J. ACM
, vol.56
, Issue.6
-
-
Regev, O.1
-
58
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS, 2011.
-
(2011)
NDSS
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
59
-
-
0005044302
-
On the security of ElGamal based encryption
-
Y. Tsiounis and M. Yung. On the security of ElGamal based encryption. In PKC, 1998.
-
(1998)
PKC
-
-
Tsiounis, Y.1
Yung, M.2
-
60
-
-
77954519783
-
Bureaucratic protocols for secure two-party sorting, selection, and permuting
-
G. Wang, T. Luo, M. T. Goodrich, W. Du, and Z. Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In CCS, 2010.
-
(2010)
CCS
-
-
Wang, G.1
Luo, T.2
Goodrich, M.T.3
Du, W.4
Zhu, Z.5
-
61
-
-
84867394997
-
Inferring and obfuscating user gender based on ratings
-
BlurMe
-
U. Weinsberg, S. Bhagat, S. Ioannidis, and N. Taft. BlurMe: Inferring and obfuscating user gender based on ratings. In RecSys, 2012.
-
(2012)
RecSys
-
-
Weinsberg, U.1
Bhagat, S.2
Ioannidis, S.3
Taft, N.4
-
62
-
-
0020312165
-
Protocols for secure computations
-
A. C.-C. Yao. Protocols for secure computations. In FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.C.-C.1
-
63
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
|