-
1
-
-
63449119775
-
-
Springer US, New York, NY, USA
-
Aggarwal, C.C. and Philip, S.Y. (2008) Privacy-Preserving Data Mining: Models and Algorithms, Vol. 34, Springer US, New York, NY, USA.
-
(2008)
Privacy-Preserving Data Mining: Models and Algorithms
, vol.34
-
-
Aggarwal, C.C.1
Philip, S.Y.2
-
2
-
-
49549105074
-
Privacy-preserving k-NN for small and large data sets
-
Amirbekyan, A. and Estivill-Castro, V. (2007) 'Privacy-preserving k-NN for small and large data sets', in IEEE ICDM Workshops, pp. 699-704.
-
(2007)
IEEE ICDM Workshops
, pp. 699-704
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
3
-
-
79960850152
-
Privacy-preserving multi-keyword ranked search over encrypted cloud data
-
Cao, N., Wang, C., Li, M., Ren, K. and Lou, W. (2011a) 'Privacy-preserving multi-keyword ranked search over encrypted cloud data', in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), pp. 829-837.
-
(2011)
Proceedings of IEEE International Conference on Computer Communications (INFOCOM)
, pp. 829-837
-
-
Cao, N.1
Wang, C.2
Li, M.3
Ren, K.4
Lou, W.5
-
4
-
-
80051914330
-
Privacy-preserving query over encrypted graph-structured data in cloud computing
-
Cao, N., Yang, Z., Wang, C., Ren, K. and Lou, W. (2011b) 'Privacy-preserving query over encrypted graph-structured data in cloud computing', in 31st International Conference on Distributed Computing Systems (ICDCS), pp. 393-402.
-
(2011)
31st International Conference on Distributed Computing Systems (ICDCS)
, pp. 393-402
-
-
Cao, N.1
Yang, Z.2
Wang, C.3
Ren, K.4
Lou, W.5
-
7
-
-
33745567199
-
Unconditionally secure constantrounds multi-party computation for equality, comparison, bits and exponentiation
-
LNCS
-
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J. and Toft, T. (2006) 'Unconditionally secure constantrounds multi-party computation for equality, comparison, bits and exponentiation', in 3rd Theory of Cryptography Conference (TCC), LNCS, Vol. 3876, pp. 285-304.
-
(2006)
3rd Theory of Cryptography Conference (TCC)
, vol.3876
, pp. 285-304
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
8
-
-
80052963407
-
Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection
-
Ghinita, G., Kalnis, P., Kantarcioglu, M. and Bertino, E. (2011) 'Approximate and exact hybrid algorithms for private nearest-neighbor queries with database protection', Geoinformatica, Vol. 15, No. 4, pp. 699-726.
-
(2011)
Geoinformatica
, vol.15
, Issue.4
, pp. 699-726
-
-
Ghinita, G.1
Kalnis, P.2
Kantarcioglu, M.3
Bertino, E.4
-
9
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
Goethals, B., Laur, S., Lipmaa, H. and Mielikainen, T. (2004) 'On private scalar product computation for privacy-preserving data mining', in 7th International Conference on Information Security and Cryptology, LNCS, Vol. 3506, pp. 104-120.
-
(2004)
7th International Conference on Information Security and Cryptology, LNCS
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
11
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with an honest majority
-
ACM Press
-
Goldreich, O., Micali, S. and Wigderson, A. (1987) 'How to play any mental game, or a completeness theorem for protocols with an honest majority', in Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC), ACM Press, pp. 218-229.
-
(1987)
Proc. of the 19th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
77952272773
-
Privacy preserving group nearest neighbor queries
-
ACM
-
Hashem, T., Kulik, L. and Zhang, R. (2010) 'Privacy preserving group nearest neighbor queries', in 13th International Conference on Extending Database Technology, ACM, pp. 489-500.
-
(2010)
13th International Conference on Extending Database Technology
, pp. 489-500
-
-
Hashem, T.1
Kulik, L.2
Zhang, R.3
-
13
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
Hore, B., Mehrotra, S., Canim, M. and Kantarcioglu, M. (2012) 'Secure multidimensional range queries over outsourced data', The VLDB Journal, Vol. 21, No. 3, pp. 333-358.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
, pp. 333-358
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
14
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
Hu, H., Xu, J., Ren, C. and Choi, B. (2011) 'Processing private queries over untrusted data cloud through privacy homomorphism', in IEEE 27th International Conference on Data Engineering (ICDE), pp. 601-612.
-
(2011)
IEEE 27th International Conference on Data Engineering (ICDE)
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
15
-
-
77956137294
-
Cryptographic cloud storage
-
Kamara, S. and Lauter, K. (2010) 'Cryptographic cloud storage', in Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, LNCS, Vol. 6054, pp. 136-149.
-
(2010)
Financial Cryptography: Workshop on Real-Life Cryptographic Protocols and Standardization, LNCS
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
17
-
-
84866351451
-
Toward privacy-assured cloud data services with flexible search functionalities
-
Li, M., Yu, S., Lou, W. and Hou, Y.T. (2012) 'Toward privacy-assured cloud data services with flexible search functionalities', in IEEE ICDCS Workshops, pp. 466-470.
-
(2012)
IEEE ICDCS Workshops
, pp. 466-470
-
-
Li, M.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
18
-
-
33750293582
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
Liu, K., Giannella, C. and Kargupta, H. (2006) 'An attacker's view of distance preserving maps for privacy preserving data mining', in 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, pp. 297-308.
-
(2006)
10th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 297-308
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
19
-
-
77954631038
-
A survey of attack techniques on privacy-preserving data perturbation methods
-
Springer
-
Liu, K., Giannella, C. and Kargupta, H. (2008) 'A survey of attack techniques on privacy-preserving data perturbation methods', in Privacy-Preserving Data Mining, pp. 359-381, Springer.
-
(2008)
Privacy-Preserving Data Mining
, pp. 359-381
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
21
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Springer
-
Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', in EUROCRYPT, LNCS, Vol. 1592, pp. 223-238, Springer.
-
(1999)
EUROCRYPT, LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
22
-
-
79955911586
-
Nearest neighbor search with strong location privacy
-
Papadopoulos, S., Bakiras, S. and Papadias, D. (2010) 'Nearest neighbor search with strong location privacy', Proceedings of the VLDB Endowment, Vol. 3, Nos. 1-2, pp. 619-629.
-
(2010)
Proceedings of the VLDB Endowment
, vol.3
, Issue.1-2
, pp. 619-629
-
-
Papadopoulos, S.1
Bakiras, S.2
Papadias, D.3
-
23
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Springer
-
Pedersen, T. (1991) 'Non-interactive and information-theoretic secure verifiable secret sharing', in CRYPTO, pp. 129-140, Springer.
-
(1991)
CRYPTO
, pp. 129-140
-
-
Pedersen, T.1
-
25
-
-
51849103902
-
Privacy preserving nearest neighbor search
-
Shaneck, M., Kim, Y. and Kumar, V. (2006) 'Privacy preserving nearest neighbor search', in IEEE ICDM Workshops, pp. 541-545.
-
(2006)
IEEE ICDM Workshops
, pp. 541-545
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
27
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Wang, C., Cao, N., Li, J., Ren, K. and Lou, W. (2010) 'Secure ranked keyword search over encrypted cloud data', in 30th IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 253-262.
-
(2010)
30th IEEE International Conference on Distributed Computing Systems (ICDCS)
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
28
-
-
84863511940
-
Enabling secure and efficient ranked keyword search over outsourced cloud data
-
Wang, C., Cao, N., Ren, K. and Lou, W. (2012a) 'Enabling secure and efficient ranked keyword search over outsourced cloud data', IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 8, pp. 1467-1479.
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.8
, pp. 1467-1479
-
-
Wang, C.1
Cao, N.2
Ren, K.3
Lou, W.4
-
29
-
-
84861636543
-
Achieving usable and privacy-assured similarity search over outsourced cloud data
-
Wang, C., Ren, K., Yu, S. and Urs, K.M.R. (2012b) 'Achieving usable and privacy-assured similarity search over outsourced cloud data', in Proceedings of IEEE INFOCOM, pp. 451-459.
-
(2012)
Proceedings of IEEE INFOCOM
, pp. 451-459
-
-
Wang, C.1
Ren, K.2
Yu, S.3
Urs, K.M.R.4
-
30
-
-
70849131456
-
Secure k-NN computation on encrypted databases
-
Wong, W.K., Cheung, D.W., Kao, B. and Mamoulis, N. (2009) 'Secure k-NN computation on encrypted databases', in Proceedings of the 35th SIGMOD, pp. 139-152.
-
(2009)
Proceedings of the 35th SIGMOD
, pp. 139-152
-
-
Wong, W.K.1
Cheung, D.W.2
Kao, B.3
Mamoulis, N.4
-
31
-
-
35248886066
-
Mining multiple private databases using a k-NN classifier
-
ACM
-
Xiong, L., Chitti, S. and Liu, L. (2007) 'Mining multiple private databases using a k-NN classifier', in ACM Symposium on Applied Computing, ACM, pp. 435-440.
-
(2007)
ACM Symposium on Applied Computing
, pp. 435-440
-
-
Xiong, L.1
Chitti, S.2
Liu, L.3
-
32
-
-
84892979405
-
Building confidential and efficient query services in the cloud with rasp data perturbation
-
December
-
Xu, H., Guo, S. and Chen, K. (2012) 'Building confidential and efficient query services in the cloud with rasp data perturbation', IEEE Transactions on Knowledge and Data Engineering, December.
-
(2012)
IEEE Transactions on Knowledge and Data Engineering
-
-
Xu, H.1
Guo, S.2
Chen, K.3
|