-
5
-
-
84875822474
-
Unique in the crowd: The privacy bounds of human mobility
-
Yves-Alexandre de Montjoye, César A Hidalgo, Michel Verleysen, and Vincent D Blondel. Unique in the crowd: The privacy bounds of human mobility. Scientific reports, 3, 2013.
-
(2013)
Scientific Reports
, vol.3
-
-
De Montjoye, Y.1
Hidalgo, C.A.2
Verleysen, M.3
Blondel, V.D.4
-
6
-
-
84904099862
-
Openpds: Protecting the privacy of metadata through safeanswers
-
Yves-Alexandre de Montjoye, Erez Shmueli, Samuel S Wang, and Alex Sandy Pentland. openpds: Protecting the privacy of metadata through safeanswers. PloS one, 9(7):e98790, 2014.
-
(2014)
PloS One
, vol.9
, Issue.7
, pp. e98790
-
-
De Montjoye, Y.1
Shmueli, E.2
Wang, S.S.3
Sandy Pentland, A.4
-
9
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
Craig Gentry. Fully homomorphic encryption using ideal lattices. In STOC, volume 9, pages 169-178, 2009.
-
(2009)
STOC
, vol.9
, pp. 169-178
-
-
Gentry, C.1
-
10
-
-
84919615392
-
Facebook tinkers with users' emotions in news feed experiment, stirring outcry
-
Vindu Goel. Facebook tinkers with users' emotions in news feed experiment, stirring outcry. The New York Times, 2014.
-
(2014)
The New York Times
-
-
Goel, V.1
-
12
-
-
0142002511
-
The elliptic curve digital signature algorithm (ecdsa)
-
Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ecdsa). International Journal of Information Security, 1(1):36-63, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
14
-
-
34548805858
-
T-closeness: Privacy beyond k-anonymity and l-diversity
-
Ninghui Li, Tiancheng Li, and Suresh Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In ICDE, volume 7, pages 106-115, 2007.
-
(2007)
ICDE
, vol.7
, pp. 106-115
-
-
Li, N.1
Li, T.2
Venkatasubramanian, S.3
-
15
-
-
34248181923
-
L-diversity: Privacy beyond kanonymity
-
Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, and Muthuramakrishnan Venkitasubramaniam. l-diversity: Privacy beyond kanonymity. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):3, 2007.
-
(2007)
ACM Transactions on Knowledge Discovery from Data (TKDD)
, vol.1
, Issue.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
16
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the XOR metric
-
Springer
-
Petar Maymounkov and David Mazieres. Kademlia: A peer-to-peer information system based on the xor metric. In Peer-to-Peer Systems, pages 53-65. Springer, 2002.
-
(2002)
Peer-to-Peer Systems
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
17
-
-
84881223453
-
Bitcoin: A peer-to-peer electronic cash system
-
Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system. Consulted, 1(2012):28, 2008.
-
(2008)
Consulted
, vol.1
, Issue.2012
, pp. 28
-
-
Nakamoto, S.1
-
21
-
-
84904132407
-
Personal data: The emergence of a new asset class
-
K Schwab, A Marcus, JO Oyola, W Hoffman, and M Luzi. Personal data: The emergence of a new asset class. In An Initiative of the World Economic Forum, 2011.
-
(2011)
An Initiative of the World Economic Forum
-
-
Schwab, K.1
Marcus, A.2
Oyola, J.O.3
Hoffman, W.4
Luzi, M.5
-
23
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|