-
1
-
-
0037252945
-
Amazon.com recommendations: Item-to-item collaborative filtering
-
G. Linden, B. Smith, and J. York Amazon.com recommendations: item-to-item collaborative filtering IEEE Internet Comput. Mag. 7 1 2003 76 80
-
(2003)
IEEE Internet Comput. Mag.
, vol.7
, Issue.1
, pp. 76-80
-
-
Linden, G.1
Smith, B.2
York, J.3
-
2
-
-
84893005073
-
-
89% is from ads (Dec.)
-
E. Protalinski, Facebook to double revenue to $4.27 billion, 89% is from ads (Dec. 2011), URL http://www.zdnet.com/blog/facebook/facebook-to- double-revenue-to-427-billion-89-is-from-ads/3877.
-
(2011)
Facebook to Double Revenue to $4.27 Billion
-
-
Protalinski, E.1
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum Untraceable electronic mail, return addresses, and digital pseudonyms Commun. ACM 24 2 1981 84 88 (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
5
-
-
85084161366
-
Tor: The second-generation onion router
-
Berkeley, CA
-
R. Dingledine, N. Mathewson, P. Syverson, Tor: the second-generation onion router, in: Proc. Conf. USENIX Secur. Symp., Berkeley, CA, 2004, p. 21.
-
(2004)
Proc. Conf. USENIX Secur. Symp.
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
6
-
-
33644989680
-
Specification of a framework for the anonymous use of privileges
-
V. Benjumea, J. López, and J.M.T. Linero Specification of a framework for the anonymous use of privileges Telemat. Inform. 23 3 2006 179 195
-
(2006)
Telemat. Inform.
, vol.23
, Issue.3
, pp. 179-195
-
-
Benjumea, V.1
López, J.2
Linero, J.M.T.3
-
8
-
-
70350379222
-
-
Springer-Verlag pp. 325-343 (Chapter Secure Multiparty Computation Goes Live)
-
P. Bogetoft, D.L. Christensen, I. Damgård, M. Geisler, T. Jakobsen, M. Krøigaard, J.D. Nielsen, J.B. Nielsen, K. Nielsen, J. Pagter, M. Schwartzbach, and T. Toft Financial Cryptography and Data Security 2009 Springer-Verlag pp. 325-343 (Chapter Secure Multiparty Computation Goes Live)
-
(2009)
Financial Cryptography and Data Security
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.11
Toft, T.12
-
9
-
-
77953499778
-
Optimistic fair priced oblivious transfer
-
AFRICACRYPT Springer-Verlag
-
A. Rial, and B. Preneel Optimistic fair priced oblivious transfer Proc. Int. Conf. Cryptology Africa AFRICACRYPT 2010 Springer-Verlag 131 147
-
(2010)
Proc. Int. Conf. Cryptology Africa
, pp. 131-147
-
-
Rial, A.1
Preneel, B.2
-
10
-
-
84892207326
-
Why adopting privacy enhancing technologies (pets) takes so much time
-
S. Gutwirth, Y. Poullet, P. Hert, R. Leenes, CPD Springer-Verlag
-
J. Borking Why adopting privacy enhancing technologies (pets) takes so much time S. Gutwirth, Y. Poullet, P. Hert, R. Leenes, Proc. Comput. Priv. Data Prot. CPD 2011 Springer-Verlag 309 341
-
(2011)
Proc. Comput. Priv. Data Prot.
, pp. 309-341
-
-
Borking, J.1
-
12
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
P. Samarati Protecting respondents' identities in microdata release IEEE Trans. Knowl. Data Eng. 13 6 2001 1010 1027 (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
13
-
-
84990966245
-
Privacy protection: P-sensitive k-anonymity property
-
Atlanta, GA
-
T.M. Truta, B. Vinay, Privacy protection: p-sensitive k-anonymity property, in: Proc. Int. Workshop Priv. Data Manage., PDM, Atlanta, GA, 2006, p. 94.
-
(2006)
Proc. Int. Workshop Priv. Data Manage., PDM
, pp. 94
-
-
Truta, T.M.1
Vinay, B.2
-
14
-
-
33749607006
-
L-diversity: Privacy beyond k-anonymity
-
Atlanta, GA
-
A. Machanavajjhala, J. Gehrke, D. Kiefer, M. Venkitasubramanian, l-diversity: privacy beyond k-anonymity, in: Proc. IEEE Int. Conf. Data Eng., ICDE, Atlanta, GA, 2006, p. 24.
-
(2006)
Proc. IEEE Int. Conf. Data Eng., ICDE
, pp. 24
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kiefer, D.3
Venkitasubramanian, M.4
-
15
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and ℓ-diversity
-
DOI 10.1109/ICDE.2007.367856, 4221659, 23rd International Conference on Data Engineering, ICDE 2007
-
N. Li, T. Li, S. Venkatasubramanian, t-closeness: privacy beyond k-anonymity and l-diversity, in: Proc. IEEE Int. Conf. Data Eng., ICDE, Istanbul, Turkey, 2007, pp. 106-115. (Pubitemid 47422014)
-
(2007)
Proceedings - International Conference on Data Engineering
, pp. 106-115
-
-
Ninghui, L.1
Tiancheng, L.2
Venkatasubramanian, S.3
-
16
-
-
65449147584
-
The cost of privacy: Destruction of data-mining utility in anonymized data publishing
-
Las Vegas, NV
-
J. Brickell, V. Shmatikov, The cost of privacy: destruction of data-mining utility in anonymized data publishing, in:Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., KDD, Las Vegas, NV, 2008, pp. 70-78.
-
(2008)
Proc. ACM SIGKDD Int. Conf. Knowl. Disc. Data Min., KDD
, pp. 70-78
-
-
Brickell, J.1
Shmatikov, V.2
-
18
-
-
77956995886
-
From t-closeness-like privacy to postrandomization via information theory
-
URL
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness-like privacy to postrandomization via information theory IEEE Trans. Knowl. Data Eng. 22 11 2010 1623 1636 URL http://doi.ieeecomputersociety.org/ 10.1109/TKDE.2009.190
-
(2010)
IEEE Trans. Knowl. Data Eng.
, vol.22
, Issue.11
, pp. 1623-1636
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
19
-
-
0038041166
-
A new privacy model for hiding group interests while accessing the Web
-
ACM Washington, DC
-
Y. Elovici, B. Shapira, and A. Maschiach A new privacy model for hiding group interests while accessing the Web Proc. Workshop Priv. Electron. Society 2002 ACM Washington, DC 63 70
-
(2002)
Proc. Workshop Priv. Electron. Society
, pp. 63-70
-
-
Elovici, Y.1
Shapira, B.2
Maschiach, A.3
-
20
-
-
12344288684
-
PRAW - The model for PRivAte Web
-
B. Shapira, Y. Elovici, A. Meshiach, and T. Kuflik PRAW - the model for PRivAte Web J. Amer. Soc. Inform. Sci., Technol. 56 2 2005 159 172
-
(2005)
J. Amer. Soc. Inform. Sci., Technol.
, vol.56
, Issue.2
, pp. 159-172
-
-
Shapira, B.1
Elovici, Y.2
Meshiach, A.3
Kuflik, T.4
-
22
-
-
35348884908
-
Privacy-enhancing personalized web search
-
DOI 10.1145/1242572.1242652, 16th International World Wide Web Conference, WWW2007
-
Y. Xu, K. Wang, B. Zhang, and Z. Chen Privacy-enhancing personalized Web search Proc. Int. WWW Conf. 2007 ACM 591 600 (Pubitemid 47582288)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 591-600
-
-
Xu, Y.1
Wang, K.2
Zhang, B.3
Chen, Z.4
-
23
-
-
77955802941
-
Optimal query forgery for private information retrieval
-
D. Rebollo-Monedero, and J. Forné Optimal query forgery for private information retrieval IEEE Trans. Inform. Theory 56 9 2010 4631 4642
-
(2010)
IEEE Trans. Inform. Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
24
-
-
78049382830
-
A privacy-preserving architecture for the semantic Web based on tag suppression
-
Bilbao, Spain
-
J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, A privacy-preserving architecture for the semantic Web based on tag suppression, in: Proc. Int. Conf. Trust, Priv. Secur. Digit. Bus., TRUSTBUS, Bilbao, Spain, 2010, pp. 58-68.
-
(2010)
Proc. Int. Conf. Trust, Priv. Secur. Digit. Bus., TRUSTBUS
, pp. 58-68
-
-
Parra-Arnau, J.1
-
26
-
-
84864742451
-
Coprivate query profile obfuscation by means of optimal query exchange between users
-
URL
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer Coprivate query profile obfuscation by means of optimal query exchange between users IEEE Trans. Depend. Secure Comput. 9 5 2012 641 654 URL http://doi. ieeecomputersociety.org/10.1109/TDSC.2012.16
-
(2012)
IEEE Trans. Depend. Secure Comput.
, vol.9
, Issue.5
, pp. 641-654
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
27
-
-
84867573877
-
OB-PWS: Obfuscation-based private Web search
-
SP IEEE Comput. Soc.
-
E. Balsa, C. Troncoso, and C. Díaz OB-PWS: obfuscation-based private Web search Proc. IEEE Symp. Secur. Priv. SP 2012 IEEE Comput. Soc. 491 505
-
(2012)
Proc. IEEE Symp. Secur. Priv.
, pp. 491-505
-
-
Balsa, E.1
Troncoso, C.2
Díaz, C.3
-
28
-
-
84867575341
-
Optimal tag suppression for privacy protection in the semantic Web data
-
URL
-
J. Parra-Arnau, D. Rebollo-Monedero, J. Forné, J.L. Muñoz, and O. Esparza Optimal tag suppression for privacy protection in the semantic Web data Knowl. Eng. 81-82 0 2012 46 66 URL http://dx.doi.org/10.1016/j.datak. 2012.07.004
-
(2012)
Knowl. Eng.
, vol.81-82
, Issue.0
, pp. 46-66
-
-
Parra-Arnau, J.1
Rebollo-Monedero, D.2
Forné, J.3
Muñoz, J.L.4
Esparza, O.5
-
30
-
-
84855380857
-
An information-theoretic privacy criterion for query forgery in information retrieval
-
SecTech Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Jeju Island, South Korea invited paper
-
D. Rebollo-Monedero, J. Parra-Arnau, and J. Forné An information-theoretic privacy criterion for query forgery in information retrieval Proc. Int. Conf. Secur. Technol. SecTech Lecture Notes Comput. Sci. (LNCS) 2011 Springer-Verlag Jeju Island, South Korea 146 154 invited paper
-
(2011)
Proc. Int. Conf. Secur. Technol.
, pp. 146-154
-
-
Rebollo-Monedero, D.1
Parra-Arnau, J.2
Forné, J.3
-
33
-
-
85180529696
-
Adnostic: Privacy preserving targeted advertising
-
V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, S. Barocas, Adnostic: privacy preserving targeted advertising, in: Proc. IEEE Symp. Netw. Distrib. Syst. Secur., SNDSS, 2010, pp. 1-21.
-
(2010)
Proc. IEEE Symp. Netw. Distrib. Syst. Secur., SNDSS
, pp. 1-21
-
-
Toubiana, V.1
Narayanan, A.2
Boneh, D.3
Nissenbaum, H.4
Barocas, S.5
-
34
-
-
80051966472
-
RePriv: Re-envisioning in-browser privacy
-
M. Fredrikson, B. Livshits, RePriv: re-envisioning in-browser privacy, in: Proc. IEEE Symp. Secur. Priv., SP, 2011, pp. 131-146.
-
(2011)
Proc. IEEE Symp. Secur. Priv., SP
, pp. 131-146
-
-
Fredrikson, M.1
Livshits, B.2
-
35
-
-
8344276595
-
Privacy Preservation Improvement by Learning Optimal Profile Generation Rate
-
T. Kuflik, B. Shapira, Y. Elovici, and A. Maschiach Privacy preservation improvement by learning optimal profile generation rate User Modeling Lecture Notes Comput. Sci. (LNCS) vol. 2702 2003 Springer-Verlag 168 177 (Pubitemid 36768562)
-
(2003)
Lecture notes in computer science
, Issue.2702
, pp. 168-177
-
-
Kuflik, T.1
Shapira, B.2
Elovici, Y.3
Maschiach, A.4
-
36
-
-
24944589228
-
Enhancing customer privacy while searching for products and services on the world wide web
-
DOI 10.1108/10662240510615164
-
Y. Elovici, C. Glezer, and B. Shapira Enhancing customer privacy while searching for products and services on the World Wide Web Internet Res. 15 4 2005 378 399 (Pubitemid 41314574)
-
(2005)
Internet Research
, vol.15
, Issue.4
, pp. 378-399
-
-
Elovici, Y.1
Glezer, C.2
Shapira, B.3
-
38
-
-
76049114679
-
Private location-based information retrieval through user collaboration
-
URL
-
D. Rebollo-Monedero, J. Forné, A. Solanas, and T. Martínez-Ballesté Private location-based information retrieval through user collaboration Comput. Commun. 33 6 2010 762 774 URL http://dx.doi.org/10.1016/j.comcom.2009.11.024
-
(2010)
Comput. Commun.
, vol.33
, Issue.6
, pp. 762-774
-
-
Rebollo-Monedero, D.1
Forné, J.2
Solanas, A.3
Martínez- Ballesté, T.4
-
40
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
Berkeley, CA
-
G. Danezis, R. Dingledine, N. Mathewson, Mixminion: design of a type III anonymous remailer protocol, in: Proc. IEEE Symp. Secur. Priv., SP, Berkeley, CA, 2003, pp. 2-15.
-
(2003)
Proc. IEEE Symp. Secur. Priv., SP
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
41
-
-
0020187981
-
On the rationale of maximum-entropy methods
-
E.T. Jaynes On the rationale of maximum-entropy methods Proc. IEEE 70 9 1982 939 952
-
(1982)
Proc. IEEE
, vol.70
, Issue.9
, pp. 939-952
-
-
Jaynes, E.T.1
-
47
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon Communication theory of secrecy systems Tech. J. Bell Syst. 1949
-
(1949)
Tech. J. Bell Syst.
-
-
Shannon, C.E.1
-
49
-
-
0017973511
-
Broadcast channels with confidential messages
-
I. Csiszár, and J. Körner Broadcast channels with confidential messages IEEE Trans. Inform. Theory 24 1978 339 348
-
(1978)
IEEE Trans. Inform. Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
50
-
-
84957800033
-
Towards Measuring Anonymity
-
Privacy Enhancing Technologies
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel Towards measuring anonymity Proc. Workshop Priv. Enhanc. Technol. PET Lecture Notes Comput. Sci. (LNCS) vol. 2482 2002 Springer-Verlag 54 68 (Pubitemid 36309879)
-
(2003)
Lecture notes in computer science
, Issue.2482
, pp. 54-68
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
52
-
-
56749173427
-
From t-closeness to PRAM and noise addition via information theory
-
PSD Lecture Notes Comput. Sci. (LNCS) Springer-Verlag Istambul, Turkey
-
D. Rebollo-Monedero, J. Forné, and J. Domingo-Ferrer From t-closeness to PRAM and noise addition via information theory Priv. Stat. Databases PSD Lecture Notes Comput. Sci. (LNCS) 2008 Springer-Verlag Istambul, Turkey 100 112
-
(2008)
Priv. Stat. Databases
, pp. 100-112
-
-
Rebollo-Monedero, D.1
Forné, J.2
Domingo-Ferrer, J.3
-
53
-
-
11944275853
-
Information theory and statistical mechanics II
-
E.T. Jaynes Information theory and statistical mechanics II Phys. Review Ser. II 108 2 1957 171 190
-
(1957)
Phys. Review Ser. II
, vol.108
, Issue.2
, pp. 171-190
-
-
Jaynes, E.T.1
-
54
-
-
85009212427
-
An efficient integrated gender detection scheme and time mediated averaging of gender dependent acoustic models
-
P.A. Olsen, S. Dharanipragada, An efficient integrated gender detection scheme and time mediated averaging of gender dependent acoustic models, in: Proc. European Conf. Speech Commun. Technol., EUROSPEECH, 2003, pp. 2509-2512.
-
(2003)
Proc. European Conf. Speech Commun. Technol., EUROSPEECH
, pp. 2509-2512
-
-
Olsen, P.A.1
Dharanipragada, S.2
-
55
-
-
0036460984
-
Theory and practice of acoustic confusability
-
H. Printz, and P. Olsen Theory and practice of acoustic confusability Comput. Speech Lang. 16 1 2002 131 164
-
(2002)
Comput. Speech Lang.
, vol.16
, Issue.1
, pp. 131-164
-
-
Printz, H.1
Olsen, P.2
-
56
-
-
34047272127
-
Average divergence distance as a statistical discrimination measure for hidden Markov models
-
DOI 10.1109/TSA.2005.858059
-
J. Silva, and S. Narayanan Average divergence distance as a statistical discrimination measure for hidden Markov models IEEE Trans. Audio, Speech, Lang. Process. 14 3 2006 890 906 (Pubitemid 46547651)
-
(2006)
IEEE Transactions on Audio, Speech and Language Processing
, vol.14
, Issue.3
, pp. 890-906
-
-
Silva, J.1
Narayanan, S.2
-
57
-
-
34547501979
-
A dtw-based dissimilarity measure for left-to-right hidden Markov models and its application to word confusability analysis
-
Q. Huo, W. Li, A dtw-based dissimilarity measure for left-to-right hidden Markov models and its application to word confusability analysis, in: Proc. Interspeech, 2006, pp. 2338-2341.
-
(2006)
Proc. Interspeech
, pp. 2338-2338
-
-
Huo, Q.1
Li, W.2
-
58
-
-
0345414074
-
An efficient image similarity measure based on approximations of kl-divergence between two Gaussian mixtures
-
J. Goldberger, S. Gordon, H. Greenspan, An efficient image similarity measure based on approximations of kl-divergence between two Gaussian mixtures, in: Proc. Int. Conf. Comput. Vision, ICCV, 2003, pp. 487-493.
-
(2003)
Proc. Int. Conf. Comput. Vision, ICCV
, pp. 487-493
-
-
Goldberger, J.1
Gordon, S.2
Greenspan, H.3
-
59
-
-
79955094273
-
Fraud detection in telecommunications using Kullback-Leibler divergence and latent Dirichlet allocation
-
Springer-Verlag
-
D. Olszewski Fraud detection in telecommunications using Kullback-Leibler divergence and latent Dirichlet allocation Proc. Adap. Nat. Comput. Alg. 2011 Springer-Verlag 71 80
-
(2011)
Proc. Adap. Nat. Comput. Alg.
, pp. 71-80
-
-
Olszewski, D.1
-
61
-
-
72849133477
-
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
-
X. Sun, H. Wang, J. Li, and T.M. Truta Enhanced p-sensitive k-anonymity models for privacy preserving data publishing Trans. Data Priv. 1 2 2008 53 66
-
(2008)
Trans. Data Priv.
, vol.1
, Issue.2
, pp. 53-66
-
-
Sun, X.1
Wang, H.2
Li, J.3
Truta, T.M.4
-
62
-
-
51749087499
-
An improved V-MDAV algorithm for l-diversity
-
Moscow, Russia
-
H. Jian-min, C. Ting-ting, Y. Hui-qun, An improved V-MDAV algorithm for l-diversity, in: Proc. IEEE Int. Symp. Inform. Process., ISIP, Moscow, Russia, 2008, pp. 733-739.
-
(2008)
Proc. IEEE Int. Symp. Inform. Process., ISIP
, pp. 733-739
-
-
Jian-Min, H.1
Ting-Ting, C.2
Hui-Qun, Y.3
-
63
-
-
49049098124
-
A critique of k-anonymity and some of its enhancements
-
Barcelona, Spain
-
J. Domingo-Ferrer, V. Torra, A critique of k-anonymity and some of its enhancements, in: Proc. Workshop Priv. Secur. Artif. Intell., PSAI, Barcelona, Spain, 2008, pp. 990-993.
-
(2008)
Proc. Workshop Priv. Secur. Artif. Intell., PSAI
, pp. 990-993
-
-
Domingo-Ferrer, J.1
Torra, V.2
-
64
-
-
84863121329
-
How much privacy? - A system to safe guard personal privacy while releasing databases
-
RSCTC Lecture Notes in Artif. Intell. (LNAI) Springer-Verlag
-
Y.T. Chiang, Y.C. Chiang, T.S. Hsu, C.J. Liau, and D.W. Wang How much privacy? - a system to safe guard personal privacy while releasing databases Proc. Int. Conf. Rough Sets, Curr. Trends Comput. RSCTC Lecture Notes in Artif. Intell. (LNAI) vol. 2475 2002 Springer-Verlag 226 233
-
(2002)
Proc. Int. Conf. Rough Sets, Curr. Trends Comput.
, vol.2475
, pp. 226-233
-
-
Chiang, Y.T.1
Chiang, Y.C.2
Hsu, T.S.3
Liau, C.J.4
Wang, D.W.5
|