-
1
-
-
20444460385
-
Private collaborative forecasting and benchmarking
-
M.J. Atallah, M. Bykova, J. Li, K.B. Frikken and M. Topkara, Private collaborative forecasting and benchmarking, in: WPES, 2004.
-
(2004)
WPES
-
-
Atallah, M.J.1
Bykova, M.2
Li, J.3
Frikken, K.B.4
Topkara, M.5
-
2
-
-
84873963079
-
Secret handshakes with dynamic and fuzzy matching
-
G. Ateniese, M. Blanton and J. Kirsch, Secret handshakes with dynamic and fuzzy matching, in: NDSS, 2007.
-
(2007)
NDSS
-
-
Ateniese, G.1
Blanton, M.2
Kirsch, J.3
-
3
-
-
84871964242
-
(If) size matters: Size-hiding private set intersection
-
G. Ateniese, E. De Cristofaro and G. Tsudik, (If) size matters: size-hiding private set intersection, in: PKC, 2011.
-
(2011)
PKC
-
-
Ateniese, G.1
De Cristofaro, E.2
Tsudik, G.3
-
4
-
-
78649955412
-
A lightweight privacy preserving sms-based recommendation system for mobile users
-
E. Baglioni, L. Becchetti, L. Bergamini, U. Colesanti, L. Filipponi, A. Vitaletti and G. Persiano, A lightweight privacy preserving sms-based recommendation system for mobile users, in: RecSys, 2010.
-
(2010)
RecSys
-
-
Baglioni, E.1
Becchetti, L.2
Bergamini, L.3
Colesanti, U.4
Filipponi, L.5
Vitaletti, A.6
Persiano, G.7
-
5
-
-
80755143980
-
Countering gattaca: Efficient and secure testing of fully-sequenced human genomes
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering gattaca: efficient and secure testing of fully-sequenced human genomes, in: CCS, 2011.
-
(2011)
CCS
-
-
Baldi, P.1
Baronio, R.2
De Cristofaro, E.3
Gasti, P.4
Tsudik, G.5
-
6
-
-
78149266544
-
Privacy-preserving fingercode authentication
-
M. Barni, T. Bianchi, D. Catalano, M. Di Raimondo, R. Labati, P. Failla, D. Fiore, R. Lazzeretti, V. Piuri, F. Scotti and A. Piva, Privacy-preserving fingercode authentication, in: MM&Sec, 2010.
-
(2010)
MM&Sec
-
-
Barni, M.1
Bianchi, T.2
Catalano, D.3
Di Raimondo, M.4
Labati, R.5
Failla, P.6
Fiore, D.7
Lazzeretti, R.8
Piuri, V.9
Scotti, F.10
Piva, A.11
-
7
-
-
84866779632
-
Secure and efficient protocols for iris and fingerprint identification
-
M. Blanton and P. Gasti, Secure and efficient protocols for iris and fingerprint identification, in: ESORICS, 2011.
-
(2011)
ESORICS
-
-
Blanton, M.1
Gasti, P.2
-
11
-
-
74049103179
-
Secure two-party k-means clustering
-
P. Bunn and R. Ostrovsky, Secure two-party k-means clustering, in: CCS, 2007.
-
(2007)
CCS
-
-
Bunn, P.1
Ostrovsky, R.2
-
12
-
-
0000182415
-
A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
-
H. Chernoff, A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations, The Annals of Mathematical Statistics 23(4) (1952), 493-507.
-
(1952)
The Annals of Mathematical Statistics
, vol.23
, Issue.4
, pp. 493-507
-
-
Chernoff, H.1
-
13
-
-
84872077464
-
-
Wiley-IEEE Press
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi and F. Scotti, Privacy in Biometrics, Wiley-IEEE Press, 2009.
-
(2009)
Privacy in Biometrics
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
15
-
-
84901829569
-
-
Cornell Univ., KDDCUP Dataset available at
-
Cornell Univ., KDDCUP Dataset, available at: http://www.cs.cornell.edu/ projects/kddcup/datasets. html.
-
-
-
-
16
-
-
84945896337
-
Genodroid: Are privacy-preserving genomic tests ready for prime time?
-
E.D. Cristofaro, S. Faber, P. Gasti and G. Tsudik, Genodroid: are privacy-preserving genomic tests ready for prime time?, in: WPES, 2012.
-
(2012)
WPES
-
-
Cristofaro, E.D.1
Faber, S.2
Gasti, P.3
Tsudik, G.4
-
17
-
-
84893240286
-
Fast and private computation of cardinality of set intersection and union
-
E. De Cristofaro, P. Gasti and G. Tsudik, Fast and private computation of cardinality of set intersection and union, in: CANS, 2012.
-
(2012)
CANS
-
-
De Cristofaro, E.1
Gasti, P.2
Tsudik, G.3
-
18
-
-
84901838016
-
-
U.S. Department of Homeland Security, available at:
-
U.S. Department of Homeland Security, available at: http://www.dhs.gov/ files/programs/usv.shtm.
-
-
-
-
19
-
-
0034130242
-
Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources
-
P. Dombek, L. Johnson, S. Zimmerley and M. Sadowsky, Use of repetitive DNA sequences and the PCR to differentiate Escherichia coli isolates from human and animal sources, Applied and Environmental Microbiology 66(6) (2000), 2572-2577.
-
(2000)
Applied and Environmental Microbiology
, vol.66
, Issue.6
, pp. 2572-2577
-
-
Dombek, P.1
Johnson, L.2
Zimmerley, S.3
Sadowsky, M.4
-
20
-
-
77949825199
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk and T. Toft, Privacy-preserving face recognition, in: PETS, 2009.
-
(2009)
PETS
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
21
-
-
43949083701
-
Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing
-
Z. Erkin, A. Piva, S. Katzenbeisser, R.L. Lagendijk, J. Shokrollahi, G. Neven and M. Barni, Protection and retrieval of encrypted multimedia content: When cryptography meets signal processing, EURASIP J. Information Security 2007 (2007), 1-20.
-
(2007)
EURASIP J. Information Security 2007
, pp. 1-20
-
-
Erkin, Z.1
Piva, A.2
Katzenbeisser, S.3
Lagendijk, R.L.4
Shokrollahi, J.5
Neven, G.6
Barni, M.7
-
22
-
-
12244263240
-
Efficient private matching and set intersection
-
M. Freedman, K. Nissim and B. Pinkas, Efficient private matching and set intersection, in: EUROCRYPT, 2004.
-
(2004)
EUROCRYPT
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
24
-
-
84901846134
-
-
IrisGuard Press Release available at
-
IrisGuard Press Release, available at: http://cl.ly/3KIB.
-
-
-
-
26
-
-
0033730804
-
Filterbank-based fingerprint matching
-
A. Jain, S. Prabhakar, L. Hong and S. Pankanti, Filterbank-based fingerprint matching, IEEE Transactions on Image Processing 9(5) (2000), 846-859.
-
(2000)
IEEE Transactions on Image Processing
, vol.9
, Issue.5
, pp. 846-859
-
-
Jain, A.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
27
-
-
0030214261
-
Image retrieval using color and shape
-
A.K. Jain and A. Vailaya, Image retrieval using color and shape, Pattern Recognition 29(8) (1996), 1223-1244.
-
(1996)
Pattern Recognition
, vol.29
, Issue.8
, pp. 1223-1244
-
-
Jain, A.K.1
Vailaya, A.2
-
28
-
-
52649171325
-
Similar document detection with limited information disclosure
-
W. Jiang, M. Murugesan, C. Clifton and L. Si, Similar document detection with limited information disclosure, in: ICDE, 2008.
-
(2008)
ICDE
-
-
Jiang, W.1
Murugesan, M.2
Clifton, C.3
Si, L.4
-
30
-
-
84862931542
-
An efficient approximate protocol for privacy-preserving association rule mining
-
M. Kantarcioglu, R. Nix and J. Vaidya, An efficient approximate protocol for privacy-preserving association rule mining, in: KDD, 2009.
-
(2009)
KDD
-
-
Kantarcioglu, M.1
Nix, R.2
Vaidya, J.3
-
32
-
-
84871965745
-
Outsourced private set intersection using homomorphic encryption
-
F. Kerschbaum, Outsourced private set intersection using homomorphic encryption, in: AsiaCCS, 2012.
-
(2012)
AsiaCCS
-
-
Kerschbaum, F.1
-
33
-
-
38049094878
-
Privacy-preserving set operations
-
L. Kissner and D. Song, Privacy-preserving set operations, in: CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Kissner, L.1
Song, D.2
-
34
-
-
79960878565
-
Findu: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu and W. Lou, Findu: Privacy-preserving personal profile matching in mobile social networks, in: INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
35
-
-
27544470145
-
Verifiable homomorphic oblivious transfer and private equality test
-
H. Lipmaa, Verifiable homomorphic oblivious transfer and private equality test, in: ASIACRYPT, 2003.
-
(2003)
ASIACRYPT
-
-
Lipmaa, H.1
-
38
-
-
0029701336
-
Texture features and learning similarity
-
W.-Y. Ma and B.S. Manjunath, Texture features and learning similarity, in: CVPR, 1996.
-
(1996)
CVPR
-
-
Ma, W.-Y.1
Manjunath, B.S.2
-
39
-
-
85043988965
-
Finding similar files in a large file system
-
U. Manber, Finding similar files in a large file system, in: USENIX, 1994.
-
(1994)
USENIX
-
-
Manber, U.1
-
40
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
M. Murugesan, W. Jiang, C. Clifton, L. Si and J. Vaidya, Efficient privacy-preserving similar document detection, The VLDB Journal 19 (2010), 457-475.
-
(2010)
The VLDB Journal
, vol.19
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
41
-
-
0027166611
-
The QBIC project: Querying images by content, using color, texture, and shape
-
W. Niblack, R. Barber, W. Equitz, M. Flickner, E.H. Glasman, D. Petkovic, P. Yanker, C. Faloutsos and G. Taubin, The QBIC project: Querying images by content, using color, texture, and shape, in: SPIE, 1993.
-
(1993)
SPIE
-
-
Niblack, W.1
Barber, R.2
Equitz, W.3
Flickner, M.4
Glasman, E.H.5
Petkovic, D.6
Yanker, P.7
Faloutsos, C.8
Taubin, G.9
-
42
-
-
84901845189
-
-
Ookla Net Metrics available at
-
Ookla Net Metrics, Canada and US source data, available at: http://www.netindex.com/source-data/, 2011.
-
(2011)
Canada and US Source Data
-
-
-
44
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, in: EUROCRYPT, 1999.
-
(1999)
EUROCRYPT
-
-
Paillier, P.1
-
45
-
-
33747408363
-
Fuzzy measures on the gene ontology for gene product similarity
-
M. Popescu, J. Keller and J. Mitchell, Fuzzy measures on the gene ontology for gene product similarity, Transactions on Computational Biology and Bioinformatics 3(3) (2006), 263-274.
-
(2006)
Transactions on Computational Biology and Bioinformatics
, vol.3
, Issue.3
, pp. 263-274
-
-
Popescu, M.1
Keller, J.2
Mitchell, J.3
-
46
-
-
33751069306
-
A secure protocol for computing string distance metrics
-
P. Ravikumar, W. Cohen and S. Fienberg, A secure protocol for computing string distance metrics, in: PSDM, 2004.
-
(2004)
PSDM
-
-
Ravikumar, P.1
Cohen, W.2
Fienberg, S.3
-
48
-
-
0031108407
-
Deformable prototypes for encoding shape categories in image databases
-
S. Sclaroff, Deformable prototypes for encoding shape categories in image databases, Pattern Recognition 30(4) (1997), 627-641.
-
(1997)
Pattern Recognition
, vol.30
, Issue.4
, pp. 627-641
-
-
Sclaroff, S.1
-
49
-
-
77951113914
-
A privacy preserving Jaccard similarity function for mining encrypted data
-
M. Singh, P. Krishna and A. Saxena, A privacy preserving Jaccard similarity function for mining encrypted data, in: TENCON, 2009.
-
(2009)
TENCON
-
-
Singh, M.1
Krishna, P.2
Saxena, A.3
-
50
-
-
0034498523
-
Content-based image retrieval at the end of the early years
-
A. Smeulders, M. Worring, S. Santini, A. Gupta and R. Jain, Content-based image retrieval at the end of the early years, IEEE Transactions on Pattern Analysis and Machine Intelligence 22(12) (2000), 1349-1380.
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.12
, pp. 1349-1380
-
-
Smeulders, A.1
Worring, M.2
Santini, S.3
Gupta, A.4
Jain, R.5
-
51
-
-
0029736339
-
Tools and techniques for color image retrieval
-
J.R. Smith and S.-F. Chang, Tools and techniques for color image retrieval, in: SPIE, 1996.
-
(1996)
SPIE
-
-
Smith, J.R.1
Chang, S.-F.2
-
52
-
-
70449467722
-
Impact of similarity measures on web-page clustering
-
A. Strehl, J. Ghosh and R. Mooney, Impact of similarity measures on web-page clustering, in: AAAI, 2000.
-
(2000)
AAAI
-
-
Strehl, A.1
Ghosh, J.2
Mooney, R.3
-
54
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
J. Vaidya and C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security 13(4) (2005), 593-622.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
55
-
-
66249113620
-
Efficient similarity joins for near duplicate detection
-
C. Xiao,W.Wang, X. Lin and J. Yu, Efficient similarity joins for near duplicate detection, in: WWW, 2008.
-
(2008)
WWW
-
-
Xiao, C.1
Wang, W.2
Lin, X.3
Yu, J.4
-
56
-
-
0022882770
-
How to generate and exchange secrets
-
A. Yao, How to generate and exchange secrets, in: FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.1
-
57
-
-
84901828092
-
-
available at:
-
Youtube press release, available at: http://www.youtube.com/t/press- statistics.
-
Youtube Press Release
-
-
-
58
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Y. Zhang, W. Liu and W. Lou, Anonymous communications in mobile ad hoc networks, in: INFOCOM, Vol. 3, 2005.
-
(2005)
INFOCOM
, vol.3
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
|