-
1
-
-
84983214590
-
-
The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east.
-
[1] IDC, EMC, The digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east, 2012. http://www.emc.com/leadership/digital-universe/iview/executive-summary-a-universe-of.htm.
-
(2012)
-
-
IDC, E.M.C.1
-
2
-
-
84983225389
-
Obama administration unveils “big data” initiative: Announces $200 million in new r&d investments
-
[2] Obama administration unveils “big data” initiative: Announces $200 million in new r&d investments, 2012. http://www.whitehouse.gov/sites/default/files/micrositesostp/big_data_press_release_final_2.pdf.
-
(2011)
-
-
-
3
-
-
84983217486
-
-
Ibm big data and analytics platform.
-
[3] Ibm big data and analytics platform. http://www-01.ibm.com/software/data/bigdata/.
-
-
-
-
4
-
-
84983215691
-
-
Bigdata@csail, mit.
-
[4] Bigdata@csail, mit. http://bigdata.csail.mit.edu/.
-
-
-
-
5
-
-
84983217494
-
-
Big data lab, school of computer science, University of st Andrews.
-
[5] Big data lab, school of computer science, University of st Andrews. http://bigdata.cs.st-andrews.ac.uk/.
-
-
-
-
6
-
-
0035008034
-
-
The skyline operator, in: Proceedings of the 17th International Conference on Data Engineering, April 2–6, 2001, Heidelberg, Germany, pp.
-
[6] S. Börzsönyi, D. Kossmann, K. Stocker, The skyline operator, in: Proceedings of the 17th International Conference on Data Engineering, April 2–6, 2001, Heidelberg, Germany, 2001, pp. 421–430.
-
(2001)
, pp. 421-430
-
-
Börzsönyi, S.1
Kossmann, D.2
Stocker, K.3
-
7
-
-
84884749775
-
Efficient skyline computation on big data
-
[7] Han, X., Li, J., Yang, D., Wang, J., Efficient skyline computation on big data. IEEE Trans. Knowl. Data Eng. 25:11 (2013), 2521–2535.
-
(2013)
IEEE Trans. Knowl. Data Eng.
, vol.25
, Issue.11
, pp. 2521-2535
-
-
Han, X.1
Li, J.2
Yang, D.3
Wang, J.4
-
8
-
-
84861186829
-
A survey of skyline processing in highly distributed environments
-
[8] Hose, K., Vlachou, A., A survey of skyline processing in highly distributed environments. VLDB J. 21:3 (2012), 359–384.
-
(2012)
VLDB J.
, vol.21
, Issue.3
, pp. 359-384
-
-
Hose, K.1
Vlachou, A.2
-
9
-
-
84958035648
-
Secure multi-party computational geometry
-
Springer
-
[9] Atallah, M.J., Du, W., Secure multi-party computational geometry. Algorithms and Data Structures, 2001, Springer, 165–179.
-
(2001)
Algorithms and Data Structures
, pp. 165-179
-
-
Atallah, M.J.1
Du, W.2
-
10
-
-
26444581774
-
An efficient solution to the millionaires’ problem based on homomorphic encryption
-
Springer
-
[10] Lin, H.-Y., Tzeng, W.-G., An efficient solution to the millionaires’ problem based on homomorphic encryption. Applied Cryptography and Network Security, 2005, Springer, 456–466.
-
(2005)
Applied Cryptography and Network Security
, pp. 456-466
-
-
Lin, H.-Y.1
Tzeng, W.-G.2
-
11
-
-
84927517111
-
-
Privacy-preserving cooperative statistical analysis, in: 17th Annual Computer Security Applications Conference, ACSAC 2001, 11–14 December 2001, New Orleans, Louisiana, USA, pp.
-
[11] W. Du, M.J. Atallah, Privacy-preserving cooperative statistical analysis, in: 17th Annual Computer Security Applications Conference, ACSAC 2001, 11–14 December 2001, New Orleans, Louisiana, USA, 2001, pp. 102–110.
-
(2001)
, pp. 102-110
-
-
Du, W.1
Atallah, M.J.2
-
12
-
-
0040172802
-
The Prime Numbers and their Distribution. Vol. 6
-
American Mathematical Society Providence
-
[12] Tenenbaum, G., France, M.M., Spain, P.G., The Prime Numbers and their Distribution. Vol. 6. 2000, American Mathematical Society, Providence.
-
(2000)
-
-
Tenenbaum, G.1
France, M.M.2
Spain, P.G.3
-
13
-
-
84968513551
-
A rigorous time bound for factoring integers
-
[13] Lenstra, H.W., Pomerance, C., A rigorous time bound for factoring integers. J. Amer. Math. Soc. 5:3 (1992), 483–516.
-
(1992)
J. Amer. Math. Soc.
, vol.5
, Issue.3
, pp. 483-516
-
-
Lenstra, H.W.1
Pomerance, C.2
-
14
-
-
64249101946
-
A proof of security of yao's protocol for two-party computation
-
[14] Lindell, Y., Pinkas, B., A proof of security of yao's protocol for two-party computation. J. Cryptol. 22:2 (2009), 161–188.
-
(2009)
J. Cryptol.
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
15
-
-
0003691180
-
Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2
-
Cambridge University Press
-
[15] Goldreich, O., Foundations of Cryptography: Volume 2, Basic Applications. Vol. 2. 2009, Cambridge University Press.
-
(2009)
-
-
Goldreich, O.1
-
16
-
-
54349095337
-
Efficient migration for mobile computing in distributed networks
-
[16] Huang, K.-H., Chung, Y.-F., Liu, C.-H., Lai, F., Chen, T.-S., Efficient migration for mobile computing in distributed networks. Comput. Stand. Interfaces 31:1 (2009), 40–47.
-
(2009)
Comput. Stand. Interfaces
, vol.31
, Issue.1
, pp. 40-47
-
-
Huang, K.-H.1
Chung, Y.-F.2
Liu, C.-H.3
Lai, F.4
Chen, T.-S.5
-
17
-
-
84983221966
-
-
The largest sports statistics and history database online.
-
[17] The largest sports statistics and history database online. http://www.databasesports.com/.
-
-
-
-
18
-
-
77953310709
-
-
Achieving secure, scalable, and fine-grained data access control in cloud computing, in: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, pp.
-
[18] S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in: INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15–19 March 2010, San Diego, CA, USA, 2010, pp. 534–542.
-
(2010)
, pp. 534-542
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
-
19
-
-
84861959172
-
Privacy-preserving public auditing for secure cloud storage
-
[19] Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W., Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62:2 (2013), 362–375.
-
(2013)
IEEE Trans. Comput.
, vol.62
, Issue.2
, pp. 362-375
-
-
Wang, C.1
Chow, S.S.M.2
Wang, Q.3
Ren, K.4
Lou, W.5
-
20
-
-
84904421834
-
-
Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, in: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27—May 2, pp.
-
[20] B. Wang, S. Yu, W. Lou, Y.T. Hou, Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud, in: 2014 IEEE Conference on Computer Communikations, INFOCOM 2014, Toronto, Canada, April 27—May 2, 2014, 2014, pp. 2112–2120.
-
(2014)
, pp. 2112-2120
-
-
Wang, B.1
Yu, S.2
Lou, W.3
Hou, Y.T.4
-
21
-
-
0344927722
-
-
Skyline with presorting, in: Proceedings of the 19th International Conference on Data Engineering, March 5–8, 2003, Bangalore, India, pp.
-
[21] J. Chomicki, P. Godfrey, J. Gryz, D. Liang, Skyline with presorting, in: Proceedings of the 19th International Conference on Data Engineering, March 5–8, 2003, Bangalore, India, 2003, pp. 717–719.
-
(2003)
, pp. 717-719
-
-
Chomicki, J.1
Godfrey, P.2
Gryz, J.3
Liang, D.4
-
22
-
-
33750439492
-
Algorithms and analyses for maximal vector computation
-
[22] Godfrey, P., Shipley, R., Gryz, J., Algorithms and analyses for maximal vector computation. VLDB J. 16:1 (2007), 5–28.
-
(2007)
VLDB J.
, vol.16
, Issue.1
, pp. 5-28
-
-
Godfrey, P.1
Shipley, R.2
Gryz, J.3
-
23
-
-
23944480086
-
Shooting stars in the sky: An online algorithm for skyline queries
-
VLDB Endowment
-
[23] Kossmann, D., Ramsak, F., Rost, S., Shooting stars in the sky: An online algorithm for skyline queries. Proceedings of the 28th International Conference on Very Large Data Bases, 2002, VLDB Endowment, 275–286.
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases
, pp. 275-286
-
-
Kossmann, D.1
Ramsak, F.2
Rost, S.3
-
24
-
-
23944477932
-
Progressive skyline computation in database systems
-
[24] Papadias, D., Tao, Y., Fu, G., Seeger, B., Progressive skyline computation in database systems. ACM Trans. Database Syst. (TODS) 30:1 (2005), 41–82.
-
(2005)
ACM Trans. Database Syst. (TODS)
, vol.30
, Issue.1
, pp. 41-82
-
-
Papadias, D.1
Tao, Y.2
Fu, G.3
Seeger, B.4
-
25
-
-
35048816109
-
Efficient distributed skylining for web information systems
-
Springer
-
[25] Balke, W.-T., Güntzer, U., Zheng, J.X., Efficient distributed skylining for web information systems. Advances in Database Technology-EDBT 2004, 2004, Springer, 256–273.
-
(2004)
Advances in Database Technology-EDBT 2004
, pp. 256-273
-
-
Balke, W.-T.1
Güntzer, U.2
Zheng, J.X.3
-
26
-
-
34548808558
-
-
SKYPEER: efficient subspace skyline computation over distributed data, in: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15–20, 2007, pp.
-
[26] A. Vlachou, C. Doulkeridis, Y. Kotidis, M. Vazirgiannis, SKYPEER: efficient subspace skyline computation over distributed data, in: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15–20, 2007, 2007, pp. 416–425.
-
(2007)
, pp. 416-425
-
-
Vlachou, A.1
Doulkeridis, C.2
Kotidis, Y.3
Vazirgiannis, M.4
-
27
-
-
84891119989
-
eSkyline: processing skyline queries over encrypted data
-
[27] Bothe, S., Karras, P., Vlachou, A., eSkyline: processing skyline queries over encrypted data. Proc. VLDB Endow. 6:12 (2013), 1338–1341.
-
(2013)
Proc. VLDB Endow.
, vol.6
, Issue.12
, pp. 1338-1341
-
-
Bothe, S.1
Karras, P.2
Vlachou, A.3
-
28
-
-
84905024335
-
Toward efficient and privacy-preserving computing in big data era
-
[28] Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J., Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28:4 (2014), 46–50.
-
(2014)
IEEE Netw.
, vol.28
, Issue.4
, pp. 46-50
-
-
Lu, R.1
Zhu, H.2
Liu, X.3
Liu, J.K.4
Shao, J.5
-
29
-
-
0022882770
-
-
How to generate and exchange secrets (extended abstract), in: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, pp.
-
[29] A.C. Yao, How to generate and exchange secrets (extended abstract), in: 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada, 27–29 October 1986, 1986, pp. 162–167.
-
(1986)
, pp. 162-167
-
-
Yao, A.C.1
-
30
-
-
84983215923
-
-
Secure multi-party computation, Manuscript. Preliminary version.
-
[30] O. Goldreich, Secure multi-party computation, Manuscript. Preliminary version.
-
-
-
Goldreich, O.1
-
31
-
-
0023545076
-
How to play any mental game
-
ACM
-
[31] Goldreich, O., Micali, S., Wigderson, A., How to play any mental game. Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, 1987, ACM, 218–229.
-
(1987)
Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
32
-
-
84914127581
-
-
Faster secure two-party computation using garbled circuits, in: USENIX Security Symposium, Vol.
-
[32] Y. Huang, D. Evans, J. Katz, L. Malka, Faster secure two-party computation using garbled circuits, in: USENIX Security Symposium, Vol. 201, 2011.
-
(2011)
, vol.201
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
33
-
-
85084163840
-
-
Fairplay-secure two-party computation system, in: USENIX Security Symposium, San Diego, CA, USA, pp.
-
[33] D. Malkhi, N. Nisan, B. Pinkas, Y. Sella, et al. Fairplay-secure two-party computation system, in: USENIX Security Symposium, San Diego, CA, USA, 2004, pp. 287–302.
-
(2004)
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
34
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
[34] Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y., Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newslett. 4:2 (2002), 28–34.
-
(2002)
ACM SIGKDD Explor. Newslett.
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
35
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer
-
[35] Freedman, M.J., Nissim, K., Pinkas, B., Efficient private matching and set intersection. Advances in Cryptology-EUROCRYPT 2004, 2004, Springer, 1–19.
-
(2004)
Advances in Cryptology-EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
36
-
-
84870504149
-
A new efficient privacy-preserving scalar product protocol
-
Australian Computer Society, Inc.
-
[36] Amirbekyan, A., Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol. Proceedings of the Sixth Australasian Conference on Data Mining and Analytics-Vol. 70, 2007, Australian Computer Society, Inc., 209–214.
-
(2007)
Proceedings of the Sixth Australasian Conference on Data Mining and Analytics-Vol. 70
, pp. 209-214
-
-
Amirbekyan, A.1
Estivill-Castro, V.2
-
37
-
-
84873848479
-
SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency
-
[37] Lu, R., Lin, X., Shen, X.S., SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24:3 (2013), 614–624.
-
(2013)
IEEE Trans. Parallel Distrib. Syst.
, vol.24
, Issue.3
, pp. 614-624
-
-
Lu, R.1
Lin, X.2
Shen, X.S.3
|