-
2
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
L. Sweeney, "Achieving k-anonymity privacy protection using generalization and suppression," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 571-588, 2002.
-
(2002)
International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
3
-
-
35348924316
-
Prive: Anonymous location-based queries in distributed mobile systems
-
G. Ghinita, P. Kalnis, and S. Skiadopoulos, "Prive: Anonymous location-based queries in distributed mobile systems," in WWW, 2007.
-
(2007)
WWW
-
-
Ghinita, G.1
Kalnis, P.2
Skiadopoulos, S.3
-
4
-
-
76149103618
-
Casper*: Query processing for location services without compromising privacy
-
C. Chow, M. Mokbel, and W. Aref, "Casper*: Query processing for location services without compromising privacy," ACM TODS, vol. 34, no. 4, 2009.
-
(2009)
ACM TODS
, vol.34
, Issue.4
-
-
Chow, C.1
Mokbel, M.2
Aref, W.3
-
5
-
-
77956175701
-
2pass: Bandwidth-optimized location cloaking for anonymous location-based services
-
H. Hu and J. Xu, "2pass: Bandwidth-optimized location cloaking for anonymous location-based services," IEEE TPDS, vol. 21, no. 10, 2010.
-
(2010)
IEEE TPDS
, vol.21
, Issue.10
-
-
Hu, H.1
Xu, J.2
-
6
-
-
76749103805
-
Privacy-conscious location-based queries in mobile environments
-
J. Xu, X. Tang, H. Hu, and J. Du, "Privacy-conscious location-based queries in mobile environments," IEEE TPDS, vol. 21, no. 3, 2010.
-
(2010)
IEEE TPDS
, vol.21
, Issue.3
-
-
Xu, J.1
Tang, X.2
Hu, H.3
Du, J.4
-
7
-
-
3142716056
-
Order-preserving encryption for numeric data
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order-preserving encryption for numeric data," in Proc. SIGMOD, 2004.
-
(2004)
Proc. SIGMOD
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
8
-
-
84893821498
-
Efficient secure query evaluation over encrypted xml databases
-
H. Wang and L. V. S. Lakshmanan, "Efficient secure query evaluation over encrypted xml databases," in Proc. VLDB, 2006.
-
(2006)
Proc. VLDB
-
-
Wang, H.1
Lakshmanan, L.V.S.2
-
9
-
-
57149125534
-
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
-
A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in Proc. SSTD, 2007.
-
(2007)
Proc. SSTD
-
-
Khoshgozaran, A.1
Shahabi, C.2
-
10
-
-
67649651664
-
Outsourcing search services on private spatial data
-
M. L. Yiu and P. K. G. Ghinita, C. S. Jensen, "Outsourcing search services on private spatial data," in Proc. ICDE, 2009.
-
(2009)
Proc. ICDE
-
-
Yiu, M.L.1
Ghinita, P.K.G.2
Jensen, C.S.3
-
11
-
-
70849131456
-
Secure knn computation on encrypted databases
-
W. K. Wong, W.-l. Cheung, B. Kao, and N. Mamoulis, "Secure knn computation on encrypted databases," in Proc. SIGMOD, 2009.
-
(2009)
Proc. SIGMOD
-
-
Wong, W.K.1
Cheung, W.-L.2
Kao, B.3
Mamoulis, N.4
-
14
-
-
51849139413
-
Efficient privacy-preserving k-nearest neighbor search
-
Y. Qi and M. J. Atallah, "Efficient privacy-preserving k-nearest neighbor search," in Proc. ICDCS, 2008.
-
(2008)
Proc. ICDCS
-
-
Qi, Y.1
Atallah, M.J.2
-
15
-
-
57149129292
-
Private queries in location based services: Anonymizers are not necessary
-
G. Ghinita, P. Kalnis, A. Khoshgozaran, C. Shahabi, and K.-L. Tan, "Private queries in location based services: Anonymizers are not necessary," in Proc. of SIGMOD, 2008.
-
(2008)
Proc. of SIGMOD
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.-L.5
-
16
-
-
79960844353
-
Strong conditional oblivious transfer and computing on intervals
-
I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in Proceedings of ASIACRYPT, 2004.
-
(2004)
Proceedings of ASIACRYPT
-
-
Blake, I.F.1
Kolesnikov, V.2
-
17
-
-
84861186664
-
Secure multidimensional range queries over outsourced data
-
B. Hore, S. Mehrotra, M. Canim, and M. Kantarcioglu, "Secure multidimensional range queries over outsourced data," The VLDB Journal, vol. 21, no. 3, 2012.
-
(2012)
The VLDB Journal
, vol.21
, Issue.3
-
-
Hore, B.1
Mehrotra, S.2
Canim, M.3
Kantarcioglu, M.4
-
18
-
-
49749109657
-
An attacker's view of distance preserving maps for privacy preserving data mining
-
K. Liu, C. Giannella, and H. Kargupta, "An attacker's view of distance preserving maps for privacy preserving data mining," in PKDD, 2006.
-
(2006)
PKDD
-
-
Liu, K.1
Giannella, C.2
Kargupta, H.3
-
21
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," ACM SIGKDD Explorations, vol. 4, no. 2, pp. 28-34, 2002.
-
(2002)
ACM SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
22
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," in Proc. ACM SIGKDD, 2002.
-
(2002)
Proc. ACM SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
25
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
J. Vaidya and C. Clifton, "Privacy-preserving k-means clustering over vertically partitioned data," in Proc. ACM SIGKDD, 2003.
-
(2003)
Proc. ACM SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
27
-
-
52649088751
-
Privacy preserving joins
-
Y. Li and M. Chen, "Privacy preserving joins," in Proc. ICDE, 2008.
-
(2008)
Proc. ICDE
-
-
Li, Y.1
Chen, M.2
-
28
-
-
32344446366
-
Privacy-preserving distributed k-means clustering over arbitrarily partitioned data
-
G. Jagannathan and R. N. Wright, "Privacy-preserving distributed k-means clustering over arbitrarily partitioned data," in Proc. SIGKDD, 2005.
-
(2005)
Proc. SIGKDD
-
-
Jagannathan, G.1
Wright, R.N.2
-
29
-
-
84862698613
-
Authenticating location-based services without compromising location privacy
-
H. Hu, J. Xu, Q. Chen, and Z. Yang, "Authenticating location-based services without compromising location privacy," in Proc. SIGMOD, 2012, pp. 301-312.
-
(2012)
Proc. SIGMOD
, pp. 301-312
-
-
Hu, H.1
Xu, J.2
Chen, Q.3
Yang, Z.4
-
30
-
-
84884509675
-
Authenticating top-k queries in location-based services with confidentiality
-
Q. Chen, H. Hu, and J. Xu, "Authenticating top-k queries in location-based services with confidentiality," in Proc. of the VLDB Endowment, Vol. 7, No. 1, 2014, pp. 49-60.
-
(2014)
Proc. of the VLDB Endowment
, vol.7
, Issue.1
, pp. 49-60
-
-
Chen, Q.1
Hu, H.2
Xu, J.3
-
31
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi, "Processing private queries over untrusted data cloud through privacy homomorphism," in Proc. ICDE, 2011.
-
(2011)
Proc. ICDE
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
33
-
-
80051865953
-
Efficient and private access to outsourced data
-
S. Vimercati, S. Foresti, S. Paraboschi, and P. S. G. Pelosi, "Efficient and private access to outsourced data," in Proc. ICDCS, 2011.
-
(2011)
Proc. ICDCS
-
-
Vimercati, S.1
Foresti, S.2
Paraboschi, S.3
Pelosi, P.S.G.4
-
34
-
-
84901752006
-
Ensuring data storage security against frequency-based attacks in wireless networks
-
H. Liu, H. Wang, and Y. Chen, "Ensuring data storage security against frequency-based attacks in wireless networks," in Proc. DCOSS, 2010.
-
(2010)
Proc. DCOSS
-
-
Liu, H.1
Wang, H.2
Chen, Y.3
-
36
-
-
0000277371
-
Public-key cryptosystems based on composite degree resid-uosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree resid-uosity classes," in Proceedings of EUROCRYPT, 1999.
-
(1999)
Proceedings of EUROCRYPT
-
-
Paillier, P.1
-
38
-
-
84919085619
-
An improved algorithm for computing logarithms over gf(p) and its cryptographic significance
-
S. Pohlig and M. Hellman, "An improved algorithm for computing logarithms over gf(p) and its cryptographic significance," IEEE Trans. Information and System Security, vol. 24, no. 1, 1978.
-
(1978)
IEEE Trans. Information and System Security
, vol.24
, Issue.1
-
-
Pohlig, S.1
Hellman, M.2
-
40
-
-
84901783260
-
Accelerating the greater than-strong conditional oblivious transfer multiparty protocol using graphics processing units
-
A. Rivera, P. Gowda, N. Vidyadhar, and M. Hall, "Accelerating the greater than-strong conditional oblivious transfer multiparty protocol using graphics processing units," in GPU Technology Conference, 2012.
-
(2012)
GPU Technology Conference
-
-
Rivera, A.1
Gowda, P.2
Vidyadhar, N.3
Hall, M.4
|