-
1
-
-
84897631559
-
-
http://acsc.csl.sri.com/libpaillier
-
-
-
-
5
-
-
0032201622
-
Private information retrieval
-
1065.68524 1678848
-
Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M.: Private information retrieval. J. ACM 45(6), 965-981 (1998)
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
6
-
-
80051865953
-
Efficient and private access to outsourced data
-
10.1109/ICDCS.2011.37
-
De Capitani di Vimercati, S.; Foresti, S.; Paraboschi, S.; Pelosi, G.; Samarati, P.: Efficient and private access to outsourced data. In: Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011), pp. 710-719 (2011)
-
(2011)
Proc. of the 31st International Conference on Distributed Computing Systems (ICDCS 2011)
, pp. 710-719
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, G.4
Samarati, P.5
-
11
-
-
79958707212
-
TrackMeNot: Resisting surveillance in web search
-
Oxford University Press London Chap. 23
-
Howe, D.C.; Nissenbaum, H.: TrackMeNot: resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp. 417-436. Oxford University Press, London (2009). Chap. 23
-
(2009)
Lessons from the Identity Trail: Anonymity, Privacy, and Identity in A Networked Society
, pp. 417-436
-
-
Howe, D.C.1
Nissenbaum, H.2
-
12
-
-
0016560084
-
Fast approximation algorithms for the knapsack and sum of subset problems
-
0345.90049 378463
-
Ibarra, O.H.; Kim, C.E.: Fast approximation algorithms for the knapsack and sum of subset problems. J. ACM 22, 463-468 (1975)
-
(1975)
J. ACM
, vol.22
, pp. 463-468
-
-
Ibarra, O.H.1
Kim, C.E.2
-
13
-
-
4544361334
-
Privacy-preserving distributed mining of association rules on horizontally partitioned data
-
10.1109/TKDE.2004.45
-
Kantarcioglu, M.; Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 1026-1037 (2004)
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, pp. 1026-1037
-
-
Kantarcioglu, M.1
Clifton, C.2
-
14
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Kushilevitz, E.; Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS, pp. 364-373 (1997)
-
(1997)
FOCS
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
15
-
-
34548805858
-
T-Closeness: Privacy beyond k-anonymity and l-diversity
-
Li, N.; Li, T.; Venkatasubramanian, S.: t-Closeness: privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106-115 (2007)
-
(2007)
ICDE
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
17
-
-
55849130742
-
High-speed private information retrieval computation on GPU
-
Melchor, C.A.; Crespin, B.; Gaborit, P.; Jolivet, V.; Rousseau, P.: High-speed private information retrieval computation on GPU. In: Secureware, pp. 263-272 (2008)
-
(2008)
Secureware
, pp. 263-272
-
-
Melchor, C.A.1
Crespin, B.2
Gaborit, P.3
Jolivet, V.4
Rousseau, P.5
-
19
-
-
34547720006
-
The new Casper: Query processing for location services without compromising privacy
-
Mokbel, M.F.; Chow, C.Y.; Aref, W.G.: The new Casper: query processing for location services without compromising privacy. In: VLDB, pp. 763-774 (2006)
-
(2006)
VLDB
, pp. 763-774
-
-
Mokbel, M.F.1
Chow, C.Y.2
Aref, W.G.3
-
20
-
-
78651560304
-
Providing privacy through plausibly deniable search
-
Murugesan, M.; Clifton, C.: Providing privacy through plausibly deniable search. In: SDM, pp. 768-779 (2009)
-
(2009)
SDM
, pp. 768-779
-
-
Murugesan, M.1
Clifton, C.2
-
21
-
-
84857066233
-
Revisiting the computational practicality of private information retrieval
-
Olumofin, F.G.; Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: Financial Cryptography, pp. 158-172 (2011)
-
(2011)
Financial Cryptography
, pp. 158-172
-
-
Olumofin, F.G.1
Goldberg, I.2
-
22
-
-
77955446650
-
Achieving efficient query privacy for location based services
-
10.1007/978-3-642-14527-8-6
-
Olumofin, F.G.; Tysowski, P.K.; Goldberg, I.; Hengartner, U.: Achieving efficient query privacy for location based services. In: Privacy Enhancing Technologies, pp. 93-110 (2010)
-
(2010)
Privacy Enhancing Technologies
, pp. 93-110
-
-
Olumofin, F.G.1
Tysowski, P.K.2
Goldberg, I.3
Hengartner, U.4
-
23
-
-
36749033301
-
Private searching on streaming data
-
10.1007/s00145-007-0565-3 1132.68023 2370040
-
Ostrovsky, R.; Skeith, W.E.: Private searching on streaming data. J. Cryptol. 20, 397-430 (2007)
-
(2007)
J. Cryptol.
, vol.20
, pp. 397-430
-
-
Ostrovsky, R.1
Skeith, W.E.2
-
24
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Lecture Notes in Computer Science 1592 Springer Berlin
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology (EUROCRYPT'99). Lecture Notes in Computer Science, vol. 1592, pp. 223-238. Springer, Berlin (1999)
-
(1999)
Advances in Cryptology (EUROCRYPT'99)
, pp. 223-238
-
-
Paillier, P.1
-
25
-
-
80052765553
-
Embellishing text search queries to protect user privacy
-
Pang, H.; Ding, X.; Xiao, X.: Embellishing text search queries to protect user privacy. Proc. VLDB Endow. 3(1), 598-607 (2010)
-
(2010)
Proc. VLDB Endow.
, vol.3
, Issue.1
, pp. 598-607
-
-
Pang, H.1
Ding, X.2
Xiao, X.3
-
26
-
-
77955456875
-
On the privacy of web search based on query obfuscation: A case study of TrackMeNot
-
10.1007/978-3-642-14527-8-2
-
Peddinti, S.T.; Saxena, N.: On the privacy of web search based on query obfuscation: a case study of TrackMeNot. In: Privacy Enhancing Technologies, pp. 19-37 (2010)
-
(2010)
Privacy Enhancing Technologies
, pp. 19-37
-
-
Peddinti, S.T.1
Saxena, N.2
-
27
-
-
77955802941
-
Optimized query forgery for private information retrieval
-
10.1109/TIT.2010.2054471
-
Rebollo-Monedero, D.; Forné, J.: Optimized query forgery for private information retrieval. IEEE Trans. Inf. Theory 56(9), 4631-4642 (2010)
-
(2010)
IEEE Trans. Inf. Theory
, vol.56
, Issue.9
, pp. 4631-4642
-
-
Rebollo-Monedero, D.1
Forné, J.2
-
28
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
10.1109/69.971193
-
Samarati, P.: Protecting respondents' identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010-1027 (2001)
-
(2001)
IEEE Trans. Knowl. Data Eng.
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
32
-
-
77958461266
-
Generalizing PIR for practical private retrieval of public data
-
Wang, S.; Agrawal, D.; Abbadi, A.E.: Generalizing PIR for practical private retrieval of public data. In: DBSec, pp. 1-16 (2010)
-
(2010)
DBSec
, pp. 1-16
-
-
Wang, S.1
Agrawal, D.2
Abbadi, A.E.3
-
34
-
-
70849130158
-
Noise injection for search privacy protection
-
3 10.1109/ICIECS.2009.5364344
-
Ye, S.; Wu, F.; Pandey, R.; Chen, H.: Noise injection for search privacy protection. In: Proceedings of the 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 1-8 (2009)
-
(2009)
Proceedings of the 2009 International Conference on Computational Science and Engineering
, pp. 1-8
-
-
Ye, S.1
Wu, F.2
Pandey, R.3
Chen, H.4
|