-
3
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
C. Gentry, "Fully homomorphic encryption using ideal lattices," in Proc. 41st Annu. ACM Symp. Theory Comput., 2009, pp. 169-169.
-
(2009)
Proc. 41st Annu. ACM Symp. Theory Comput
, pp. 169-169
-
-
Gentry, C.1
-
6
-
-
67651030465
-
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, A. C. Chan, E. Mykletun, and G. Tsudik, "Efficient and provably secure aggregation of encrypted data in wireless sensor networks," Trans. Sensor Netw., vol. 5, no. 3, p. 20, 2009.
-
(2009)
Trans. Sensor Netw
, vol.5
, Issue.3
, pp. 20
-
-
Castelluccia, C.1
Chan, A.C.2
Mykletun, E.3
Tsudik, G.4
-
7
-
-
33749525209
-
Efficient aggregation of encrypted data in wireless sensor networks
-
C. Castelluccia, E. Mykletun, and G. Tsudik, "Efficient aggregation of encrypted data in wireless sensor networks," in Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst.: Netw. Serv., 2005, pp. 109-117.
-
(2005)
Proc. 2nd Annu. Int. Conf. Mobile Ubiquitous Syst.: Netw. Serv
, pp. 109-117
-
-
Castelluccia, C.1
Mykletun, E.2
Tsudik, G.3
-
9
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," SIGKDD Explorations Newslett., vol. 4, no. 2, pp. 28-34, 2002.
-
(2002)
SIGKDD Explorations Newslett
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
10
-
-
34548301953
-
Pda: Privacy-preserving data aggregation in wireless sensor networks
-
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, "PDA: Privacy-preserving data aggregation in wireless sensor networks," in Proc. IEEE Conf. Comput. Commun., 2007, pp. 2045-2053.
-
(2007)
Proc. IEEE Conf. Comput. Commun
, pp. 2045-2053
-
-
He, W.1
Liu, X.2
Nguyen, H.3
Nahrstedt, K.4
Abdelzaher, T.5
-
11
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song, "Privacy-preserving aggregation of time-series data," in Proc. Netw. Distrib. Syst. Security Symp., vol. 2, 2011, p. 4.
-
(2011)
Proc. Netw. Distrib. Syst. Security Symp
, vol.2
, pp. 4
-
-
Shi, E.1
Chan, T.-H.H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
14
-
-
84865833847
-
Privacy-preserving stream aggregation with fault tolerance
-
T.-H. H. Chan, E. Shi, and D. Song, "Privacy-preserving stream aggregation with fault tolerance," in Proc. 16th Int. Conf. Financial Cryptography Data Security, 2012, pp. 200-214.
-
(2012)
Proc. 16th Int. Conf. Financial Cryptography Data Security
, pp. 200-214
-
-
Chan, T.-H.H.1
Shi, E.2
Song, D.3
-
16
-
-
84876804705
-
Secure multiparty aggregation with differential privacy: A comparative study
-
S. Goryczka, L. Xiong, and V. Sunderam, "Secure multiparty aggregation with differential privacy: A comparative study," in Proc. Joint EDBT/ICDT Workshops, 2013, pp. 155-163.
-
(2013)
Proc. Joint EDBT/ICDT Workshops
, pp. 155-163
-
-
Goryczka, S.1
Xiong, L.2
Sunderam, V.3
-
17
-
-
84884945801
-
Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error
-
Q. Li and G. Cao, "Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error," in Proc. 13th Int. Symp. Privacy Enhancing Technol., 2013, pp. 60-81.
-
(2013)
Proc. 13th Int. Symp. Privacy Enhancing Technol
, pp. 60-81
-
-
Li, Q.1
Cao, G.2
-
19
-
-
84904437773
-
Achieving differential privacy of data disclosure in the smart grid
-
J. Zhao, T. Jung, Y. Wang, and X.-Y. Li, "Achieving differential privacy of data disclosure in the smart grid," in Proc. IEEE Conf. Comput. Commun., 2014.
-
(2014)
Proc. IEEE Conf. Comput. Commun
-
-
Zhao, J.1
Jung, T.2
Wang, Y.3
Li, X.-Y.4
-
22
-
-
84893264480
-
Message in a sealed bottle: Privacy preserving friending in social networks
-
L. Zhang, X.-Y. Li, and Y. Liu, "Message in a sealed bottle: Privacy preserving friending in social networks," in Proc. IEEE 33rd Int. Conf. Distrib. Comput. Syst., 2013, pp. 327-336.
-
(2013)
Proc. IEEE 33rd Int. Conf. Distrib. Comput. Syst
, pp. 327-336
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
-
25
-
-
84883112893
-
Privacy preserving cloud data access with multi-Authorities
-
T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-Authorities," in Proc. IEEE Conf. Comput. Commun., 2013, pp. 2625-2633.
-
(2013)
Proc. IEEE Conf. Comput. Commun
, pp. 2625-2633
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
26
-
-
84883115549
-
Search me if you can: Privacy-preserving location query service
-
X.-Y. Li and T. Jung, "Search me if you can: Privacy-preserving location query service," in Proc. IEEE Conf. Comput. Commun., 2013, pp. 2760-2768.
-
(2013)
Proc. IEEE Conf. Comput. Commun
, pp. 2760-2768
-
-
Li, X.-Y.1
Jung, T.2
-
27
-
-
84883129081
-
Verifiable private multiparty computation: Ranging and ranking
-
L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multiparty computation: Ranging and ranking," in Proc. IEEE Conf. Comput. Commun., 2013, pp. 605-609.
-
(2013)
Proc. IEEE Conf. Comput. Commun
, pp. 605-609
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
Jung, T.4
-
28
-
-
11844281385
-
State-of-The-Art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, and Y. Theodoridis, "State-of-The-Art in privacy preserving data mining," ACM SIGMOD Rec., vol. 33, no. 1, pp. 50-57, 2004.
-
(2004)
ACM SIGMOD Rec
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
29
-
-
84921404221
-
-
Providence, RI, USA: Amer. Math. Soc
-
J. Feigenbaum and M. Merritt, Distributed Computing and Cryptography: Proceedings of a DIMACS Workshop, vol. 2, Providence, RI, USA: Amer. Math. Soc., 1991.
-
(1991)
Distributed Computing and Cryptography: Proceedings of A DIMACS Workshop
, vol.2
-
-
Feigenbaum, J.1
Merritt, M.2
-
31
-
-
84884485011
-
Hard-core predicates for a diffie-hellman problem over finite fields
-
N. Fazio, R. Gennaro, I. M. Perera, and W. E. Skeith III, "Hard-core predicates for a Diffie-Hellman problem over finite fields," in Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol., 2013, pp. 148-165.
-
(2013)
Proc. 33rd Annu. Cryptol. Conf. Adv. Cryptol
, pp. 148-165
-
-
Fazio, N.1
Gennaro, R.2
Perera, I.M.3
Skeith, W.E.4
-
32
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
A. Ben-David, N. Nisan, and B. Pinkas, "Fairplaymp: A system for secure multi-party computation," in Proc. 15th ACM Conf. Comput. Commun. Security, 2008, pp. 257-266.
-
(2008)
Proc. 15th ACM Conf. Comput. Commun. Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
33
-
-
0025137207
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, and P. Rogaway, "The round complexity of secure protocols," in Proc. 22nd Annu. ACM Symp. Theory Comput., 1990, pp. 503-513.
-
(1990)
Proc. 22nd Annu. ACM Symp. Theory Comput
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
35
-
-
84883089676
-
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
-
T. Jung, X. Mao, X.-Y. Li, S.-J. Tang, W. Gong, and L. Zhang, "Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation," in Proc. IEEE Conf. Comput. Commun., 2013, pp. 2634-2642.
-
(2013)
Proc. IEEE Conf. Comput. Commun
, pp. 2634-2642
-
-
Jung, T.1
Mao, X.2
Li, X.-Y.3
Tang, S.-J.4
Gong, W.5
Zhang, L.6
-
36
-
-
84904437867
-
Privacy-preserving high-quality map generation with participatory sensing
-
X. Chen, X. Wu, X.-Y. Li, Y. He, and Y. Liu, "Privacy-preserving high-quality map generation with participatory sensing," in Proc. IEEE Conf. Comput. Commun., 2014.
-
(2014)
Proc. IEEE Conf. Comput. Commun
-
-
Chen, X.1
Wu, X.2
Li, X.-Y.3
He, Y.4
Liu, Y.5
-
37
-
-
77951201056
-
Privacy-preserving data publishing: A survey of recent developments
-
B. Fung, K. Wang, R. Chen, and P. S. Yu, "Privacy-preserving data publishing: A survey of recent developments," ACM Comput. Surv., vol. 42, no. 4, p. 14, 2010.
-
(2010)
ACM Comput. Surv
, vol.42
, Issue.4
, pp. 14
-
-
Fung, B.1
Wang, K.2
Chen, R.3
Yu, P.S.4
-
38
-
-
80052799499
-
A general survey of privacypreserving data mining models and algorithms
-
Heidelberg, Germany: Springer
-
C. C. Aggarwal and S. Y. Philip, "A general survey of privacypreserving data mining models and algorithms," in Privacy-Preserving Data Mining Models and Algorithms. Heidelberg, Germany: Springer, 2008.
-
(2008)
Privacy-Preserving Data Mining Models and Algorithms
-
-
Aggarwal, C.C.1
Philip, S.Y.2
-
39
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. Theory Appl. Cryptographic Tech. 27th Annu. Int. Conf. Adv. Cryptology, 2008, pp. 146-162.
-
(2008)
Proc. Theory Appl. Cryptographic Tech. 27th Annu. Int. Conf. Adv. Cryptology
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
40
-
-
0031998594
-
On the polynomial form of boolean functions: Derivations and applications
-
Feb
-
W. G. Schneeweiss, "On the polynomial form of boolean functions: Derivations and applications," IEEE Trans. Comput., vol. 47, no. 2, pp. 217-221, Feb. 1998.
-
(1998)
IEEE Trans. Comput
, vol.47
, Issue.2
, pp. 217-221
-
-
Schneeweiss, W.G.1
-
41
-
-
0000982859
-
A note on the polynomial form of boolean functions and related topics
-
Aug
-
B. J. Falkowski, "A note on the polynomial form of boolean functions and related topics," IEEE Trans. Comput., vol. 48, no. 8, pp. 860-864, Aug. 1999.
-
(1999)
IEEE Trans. Comput
, vol.48
, Issue.8
, pp. 860-864
-
-
Falkowski, B.J.1
-
43
-
-
34247216451
-
Internet advertising and the generalized second price auction: Selling billions of dollars worth of keywords
-
MA, USA, Tech. Rep. No. w11765
-
B. Edelman, M. Ostrovsky, and M. Schwarz, "Internet advertising and the generalized second price auction: Selling billions of dollars worth of keywords," Nat. Bureau Econ. Res., MA, USA, Tech. Rep. No. w11765, 2005.
-
(2005)
Nat. Bureau Econ. Res
-
-
Edelman, B.1
Ostrovsky, M.2
Schwarz, M.3
|