-
1
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao, "How to generate and exchange secrets," in FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
-
2
-
-
84914153789
-
Automating efficient ram-model secure computation
-
C. Liu, Y. Huang, E. Shi, J. Katz, and M. Hicks, "Automating efficient ram-model secure computation," in IEEE S & P, 2014.
-
(2014)
IEEE S & P
-
-
Liu, C.1
Huang, Y.2
Shi, E.3
Katz, J.4
Hicks, M.5
-
3
-
-
84888987660
-
Privacy-preserving matrix factorization
-
V. Nikolaenko, S. Ioannidis, U. Weinsberg, M. Joye, N. Taft, and D. Boneh, "Privacy-preserving matrix factorization," in ACM CCS, 2013.
-
(2013)
ACM CCS
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
4
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
V. Nikolaenko, U. Weinsberg, S. Ioannidis, M. Joye, D. Boneh, and N. Taft, "Privacy-preserving ridge regression on hundreds of millions of records," in IEEE (S & P), 2013.
-
(2013)
IEEE (S & P)
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
7
-
-
37549003336
-
Mapreduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat, "Mapreduce: Simplified data processing on large clusters," Commun. ACM, 2008.
-
(2008)
Commun. ACM
-
-
Dean, J.1
Ghemawat, S.2
-
8
-
-
77954723629
-
Pregel: A system for large-scale graph processing
-
G. Malewicz, M. H. Austern, A. J. Bik, J. C. Dehnert, I. Horn, N. Leiser, and G. Czajkowski, "Pregel: A system for large-scale graph processing," in SIGMOD, 2010.
-
(2010)
SIGMOD
-
-
Malewicz, G.1
Austern, M.H.2
Bik, A.J.3
Dehnert, J.C.4
Horn, I.5
Leiser, N.6
Czajkowski, G.7
-
9
-
-
84863735533
-
Distributed graphlab: A framework for machine learning and data mining in the cloud
-
Y. Low, D. Bickson, J. Gonzalez, C. Guestrin, A. Kyrola, and J. M. Hellerstein, "Distributed graphlab: a framework for machine learning and data mining in the cloud," PVLDB, 2012.
-
(2012)
PVLDB
-
-
Low, Y.1
Bickson, D.2
Gonzalez, J.3
Guestrin, C.4
Kyrola, A.5
Hellerstein, J.M.6
-
10
-
-
85085251984
-
Spark: Cluster computing with working sets
-
M. Zaharia, M. Chowdhury, M. J. Franklin, S. Shenker, and I. Stoica, "Spark: cluster computing with working sets," in HotCloud, 2010.
-
(2010)
HotCloud
-
-
Zaharia, M.1
Chowdhury, M.2
Franklin, M.J.3
Shenker, S.4
Stoica, I.5
-
11
-
-
84945182982
-
Oblivm: A programming framework for secure computation
-
X. S. Wang, C. Liu, K. Nayak, Y. Huang, and E. Shi, "Oblivm: A programming framework for secure computation," IEEE Symposium on Security and Privacy (S & P), 2015.
-
(2015)
IEEE Symposium on Security and Privacy (S & P)
-
-
Wang, X.S.1
Liu, C.2
Nayak, K.3
Huang, Y.4
Shi, E.5
-
12
-
-
85072980230
-
Powergraph: Distributed graph-parallel computation on natural graphs
-
J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin, "Powergraph: Distributed graph-parallel computation on natural graphs." in OSDI, 2012.
-
(2012)
OSDI
-
-
Gonzalez, J.E.1
Low, Y.2
Gu, H.3
Bickson, D.4
Guestrin, C.5
-
14
-
-
84874155278
-
Data-oblivious graph drawing model and algorithms
-
M. T. Goodrich, O. Ohrimenko, and R. Tamassia, "Data-oblivious graph drawing model and algorithms," CoRR, 2012.
-
(2012)
CoRR
-
-
Goodrich, M.T.1
Ohrimenko, O.2
Tamassia, R.3
-
15
-
-
78650606457
-
Privacy-preserving data-oblivious geometric algorithms for geographic data
-
D. Eppstein, M. T. Goodrich, and R. Tamassia, "Privacy-preserving data-oblivious geometric algorithms for geographic data," in SIGSPA-TIAL, 2010.
-
(2010)
SIGSPA-TIAL
-
-
Eppstein, D.1
Goodrich, M.T.2
Tamassia, R.3
-
16
-
-
84881219897
-
Circuit structures for improving efficiency of security and privacy tools
-
S. Zahur and D. Evans, "Circuit structures for improving efficiency of security and privacy tools," in S & P, 2013.
-
(2013)
S & P
-
-
Zahur, S.1
Evans, D.2
-
17
-
-
84877998963
-
Data-oblivious graph algorithms for secure computation and outsourcing
-
M. Blanton, A. Steele, and M. Alisagari, "Data-oblivious graph algorithms for secure computation and outsourcing," in ASIA CCS. ACM, 2013.
-
(2013)
Asia CCS ACM
-
-
Blanton, M.1
Steele, A.2
Alisagari, M.3
-
18
-
-
79961186203
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982.
-
(1982)
FOCS
-
-
Yao, A.C.-C.1
-
19
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
S. D. Gordon, J. Katz, V. Kolesnikov, F. Krell, T. Malkin, M. Raykova, and Y. Vahlis, "Secure two-party computation in sublinear (amortized) time," in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
20
-
-
84889073782
-
Fast two-party secure computation with minimal assumptions
-
a. shelat and C.-H. Shen
-
a. shelat and C.-H. Shen, "Fast two-party secure computation with minimal assumptions," in CCS, 2013.
-
(2013)
CCS
-
-
-
22
-
-
80755169442
-
Automatically optimizing secure computation
-
F. Kerschbaum, "Automatically optimizing secure computation," in CCS, 2011.
-
(2011)
CCS
-
-
Kerschbaum, F.1
-
24
-
-
84893284162
-
PCF: A portable circuit format for scalable two-party secure computation
-
B. Kreuter, B. Mood, A. Shelat, and K. Butler, "PCF: A portable circuit format for scalable two-party secure computation," in USENIX Security, 2013.
-
(2013)
USENIX Security
-
-
Kreuter, B.1
Mood, B.2
Shelat, A.3
Butler, K.4
-
25
-
-
85084163840
-
Fairplay: A secure two-party computation system
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay: a secure two-party computation system," in USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
26
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg, "Tasty: tool for automating secure two-party computations," in CCS, 2010.
-
(2010)
CCS
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
27
-
-
84914124819
-
Wysteria: A programming language for generic, mixed-mode multiparty computations
-
A. Rastogi, M. A. Hammer, and M. Hicks, "Wysteria: A programming language for generic, mixed-mode multiparty computations," in IEEE Symposium on Security and Privacy (S & P), 2014.
-
(2014)
IEEE Symposium on Security and Privacy (S & P)
-
-
Rastogi, A.1
Hammer, M.A.2
Hicks, M.3
-
28
-
-
84869419752
-
Secure two-party computations in ansi c
-
A. Holzer, M. Franz, S. Katzenbeisser, and H. Veith, "Secure two-party computations in ansi c," in CCS, 2012.
-
(2012)
CCS
-
-
Holzer, A.1
Franz, M.2
Katzenbeisser, S.3
Veith, H.4
-
29
-
-
84889039708
-
Picco: A general-purpose compiler for private distributed computation
-
Y. Zhang, A. Steele, and M. Blanton, "Picco: a general-purpose compiler for private distributed computation," in CCS, 2013.
-
(2013)
CCS
-
-
Zhang, Y.1
Steele, A.2
Blanton, M.3
-
30
-
-
78149254461
-
Improved garbled circuit: Free XOR gates and applications
-
V. Kolesnikov and T. Schneider, "Improved Garbled Circuit: Free XOR Gates and Applications," in ICALP, 2008.
-
(2008)
ICALP
-
-
Kolesnikov, V.1
Schneider, T.2
-
31
-
-
84869424520
-
On the security of the "free-XOR" technique
-
S. G. Choi, J. Katz, R. Kumaresan, and H.-S. Zhou, "On the security of the "free-xor" technique," in Theory of Cryptography Conference (TCC), 2012.
-
(2012)
Theory of Cryptography Conference (TCC)
-
-
Choi, S.G.1
Katz, J.2
Kumaresan, R.3
Zhou, H.-S.4
-
33
-
-
84893267219
-
Gpu and cpu par-allelization of honest-but-curious secure two-party computation
-
N. Husted, S. Myers, A. Shelat, and P. Grubbs, "Gpu and cpu par-allelization of honest-but-curious secure two-party computation," in Annual Computer Security Applications Conference, 2013.
-
(2013)
Annual Computer Security Applications Conference
-
-
Husted, N.1
Myers, S.2
Shelat, A.3
Grubbs, P.4
-
36
-
-
84910008461
-
Practical covertly secure mpc for dishonest majority-or: Breaking the spdz limits
-
I. Damgård, M. Keller, E. Larraia, V. Pastro, P. Scholl, and N. P. Smart, "Practical covertly secure mpc for dishonest majority-or: Breaking the spdz limits," in Computer Security-ESORICS 2013, 2013.
-
(2013)
Computer Security-ESORICS 2013
-
-
Damgård, I.1
Keller, M.2
Larraia, E.3
Pastro, V.4
Scholl, P.5
Smart, N.P.6
-
37
-
-
0002531104
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC, 1988.
-
(1988)
ACM STOC
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
38
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious RAMs," J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
39
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving group data access via stateless oblivious RAM simulation," in SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
41
-
-
84860181777
-
On the (in)security of hash-based oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (in)security of hash-based oblivious RAM and a new balancing scheme," in SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
42
-
-
80955131283
-
Oblivious RAM simulation with efficient worst-case access overhead
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Oblivious RAM simulation with efficient worst-case access overhead," in CCSW, 2011.
-
(2011)
CCSW
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
43
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
I. Damgård, S. Meldgaard, and J. B. Nielsen, "Perfectly secure oblivious RAM without random oracles," in TCC, 2011.
-
(2011)
TCC
-
-
Damgård, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
45
-
-
70349278621
-
Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
-
P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage," in CCS, 2008.
-
(2008)
CCS
-
-
Williams, P.1
Sion, R.2
Carbunar, B.3
-
47
-
-
84881228714
-
Privacy-preserving access of outsourced data via oblivious RAM simulation
-
M. T. Goodrich and M. Mitzenmacher, "Privacy-preserving access of outsourced data via oblivious RAM simulation," in ICALP, 2011.
-
(2011)
ICALP
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
-
50
-
-
84945230278
-
SR-ORAM: Single round-trip oblivious ram
-
P. Williams and R. Sion, "SR-ORAM: Single round-trip oblivious ram," in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Williams, P.1
Sion, R.2
-
52
-
-
84889005645
-
Path ORAM-an extremely simple oblivious ram protocol
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. De-vadas, "Path ORAM-an extremely simple oblivious ram protocol," in CCS, 2013.
-
(2013)
CCS
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
53
-
-
84945241357
-
Circuit oram: On tightness of the goldreich-ostrovsky lower bound
-
X. S. Wang, T.-H. H. Chan, and E. Shi, "Circuit oram: On tightness of the goldreich-ostrovsky lower bound," Cryptology ePrint Archive, Report 2014/672, 2014, http://eprint.iacr.org/.
-
(2014)
Cryptology EPrint Archive, Report 2014/672
-
-
Wang, X.S.1
Chan, T.-H.H.2
Shi, E.3
-
55
-
-
84910678637
-
Oblivious data structures
-
X. Wang, K. Nayak, C. Liu, E. Shi, E. Stefanov, and Y. Huang, "Oblivious data structures," in ACM CCS, 2014.
-
(2014)
ACM CCS
-
-
Wang, X.1
Nayak, K.2
Liu, C.3
Shi, E.4
Stefanov, E.5
Huang, Y.6
-
58
-
-
77957838299
-
The hadoop distributed file system
-
K. Shvachko, H. Kuang, S. Radia, and R. Chansler, "The hadoop distributed file system," in Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium on. IEEE, 2010, pp. 1-10.
-
(2010)
Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th Symposium On. IEEE
, pp. 1-10
-
-
Shvachko, K.1
Kuang, H.2
Radia, S.3
Chansler, R.4
-
59
-
-
81055146170
-
Giraph: Large-scale graph processing infrastruction on hadoop
-
C. Avery, "Giraph: Large-scale graph processing infrastruction on hadoop," Hadoop Summit., 2011.
-
(2011)
Hadoop Summit.
-
-
Avery, C.1
-
61
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
Y Koren, R. Bell, and C. Volinsky, "Matrix factorization techniques for recommender systems," Computer, vol. 42, no. 8, pp. 30-37, 2009.
-
(2009)
Computer
, vol.42
, Issue.8
, pp. 30-37
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
62
-
-
84921817164
-
Learning representations by back-propagating errors
-
D. E. Rumelhart, G. E. Hinton, and R. J. Williams, "Learning representations by back-propagating errors," Cognitive modeling, vol. 5, 1988.
-
(1988)
Cognitive Modeling
, vol.5
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
63
-
-
84055213478
-
Distributed optimization and statistical learning via the alternating direction method of multipliers
-
S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein, "Distributed optimization and statistical learning via the alternating direction method of multipliers," Foundations and Trends® in Machine Learning, 2011.
-
(2011)
Foundations and Trends® in Machine Learning
-
-
Boyd, S.1
Parikh, N.2
Chu, E.3
Peleato, B.4
Eckstein, J.5
-
67
-
-
84945230284
-
Algorithms sequential & parallel: A unified approach
-
R. Miller and L. Boxer, Algorithms sequential & parallel: A unified approach. Cengage Learning, 2012.
-
(2012)
Cengage Learning
-
-
Miller, R.1
Boxer, L.2
-
68
-
-
67650136792
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Y Lindell and B. Pinkas, "An efficient protocol for secure two-party computation in the presence of malicious adversaries," in EUROCRYPT, 2007.
-
(2007)
EUROCRYPT
-
-
Lindell, Y.1
Pinkas, B.2
-
70
-
-
84945230285
-
-
"Oblivm," http://www.oblivm.com.
-
Oblivm
-
-
-
71
-
-
84904200574
-
Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o(n log n) time
-
M. T. Goodrich, "Zig-zag sort: A simple deterministic data-oblivious sorting algorithm running in o(n log n) time," CoRR, 2014.
-
(2014)
CoRR
-
-
Goodrich, M.T.1
-
72
-
-
84945230286
-
-
Graphlab powergraph tutorials
-
"Graphlab powergraph tutorials," https://github.com/graphlab-code/graphlab.
-
-
-
-
73
-
-
84945230287
-
-
Movielens dataset
-
"Movielens dataset," http://grouplens.org/datasets/movielens/.
-
-
-
-
74
-
-
85116175892
-
Recommending with an agenda: Active learning of private attributes using matrix factorization
-
S. Bhagat, U. Weinsberg, S. Ioannidis, and N. Taft, "Recommending with an agenda: Active learning of private attributes using matrix factorization," in RecSys '14. ACM.
-
RecSys '14. ACM
-
-
Bhagat, S.1
Weinsberg, U.2
Ioannidis, S.3
Taft, N.4
-
75
-
-
84904296264
-
Privacy tradeoffs in predictive analytics
-
S. Ioannidis, A. Montanari, U. Weinsberg, S. Bhagat, N. Fawaz, and N. Taft, "Privacy tradeoffs in predictive analytics," in SIGMETRICS'14. ACM, 2014.
-
(2014)
SIGMETRICS'14. ACM
-
-
Ioannidis, S.1
Montanari, A.2
Weinsberg, U.3
Bhagat, S.4
Fawaz, N.5
Taft, N.6
-
76
-
-
84881232126
-
Efficient garbling from a fixed-key blockcipher
-
M. Bellare, V. T. Hoang, S. Keelveedhi, and P. Rogaway, "Efficient garbling from a fixed-key blockcipher," in IEEE Symposium on Security and Privacy (SP), 2013.
-
(2013)
IEEE Symposium on Security and Privacy (SP)
-
-
Bellare, M.1
Hoang, V.T.2
Keelveedhi, S.3
Rogaway, P.4
-
77
-
-
84945230291
-
-
Tc man page
-
"Tc man page," http://manpages.ubuntu.com/manpages//karmic/man8/tc.8.html.
-
-
-
-
78
-
-
84945230292
-
-
Iperf
-
"Iperf," https://iperf.fr/.
-
-
-
|