-
1
-
-
84924195580
-
Bookmark-coloring algorithm for personalized PageRank
-
Berkhin, P.: Bookmark-coloring algorithm for personalized PageRank. Internet Mathematics 3(1), 41–62 (2006)
-
(2006)
Internet Mathematics
, vol.3
, Issue.1
, pp. 41-62
-
-
Berkhin, P.1
-
2
-
-
0004116989
-
-
4th edn. MIT Press
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 4th edn. MIT Press (2009)
-
(2009)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
3
-
-
84861133582
-
Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing
-
Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing. IEEE Trans. Information Forensics and Security 7(3), 1053–1066 (2012)
-
(2012)
IEEE Trans. Information Forensics and Security
, vol.7
, Issue.3
, pp. 1053-1066
-
-
Erkin, Z.1
Veugen, T.2
Toft, T.3
Lagendijk, R.L.4
-
4
-
-
84914127581
-
-
USENIX Security
-
Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. USENIX Security (2011)
-
(2011)
Faster Secure Two-Party Computation Using Garbled Circuits
-
-
Huang, Y.1
Evans, D.2
Katz, J.3
Malka, L.4
-
5
-
-
84971306987
-
A privacy-preserving framework for personalized, social recommendations
-
Jorgensen, Z., Yu, T.: A privacy-preserving framework for personalized, social recommendations. In: EDBT 2014, pp. 571–582 (2014)
-
(2014)
EDBT 2014
, pp. 571-582
-
-
Jorgensen, Z.1
Yu, T.2
-
6
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
Garay, J.A., Miyaji, A., Otsuka, A. (eds.), Springer, Heidelberg
-
Kolesnikov, V., Sadeghi, A.-R., Schneider, T.: Improved garbled circuit building blocks and applications to auctions and computing minima. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 1–20. Springer, Heidelberg (2009)
-
(2009)
CANS 2009. LNCS
, vol.5888
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
7
-
-
72449160235
-
On social networks and collaborative recommendation
-
Konstas, I., Stathopoulos, V., Jose, J.M.: On social networks and collaborative recommendation. In: ACM, pp. 195–202 (2009)
-
(2009)
ACM
, pp. 195-202
-
-
Konstas, I.1
Stathopoulos, V.2
Jose, J.M.3
-
8
-
-
84884994174
-
Privacy-preserving social recommendations in geosocial networks
-
Liu, B., Hengartner, U.: Privacy-preserving social recommendations in geosocial networks. In: IEEE, pp. 69–76. (2013)
-
(2013)
IEEE
, pp. 69-76
-
-
Liu, B.1
Hengartner, U.2
-
9
-
-
64249101946
-
A Proof of Security of Yao’s Protocol for Two-Party Computation
-
Lindell, Y., Pinkas, B.: A Proof of Security of Yao’s Protocol for Two-Party Computation. J. Cryptology 22(2), 161–188 (2009)
-
(2009)
J. Cryptology
, vol.22
, Issue.2
, pp. 161-188
-
-
Lindell, Y.1
Pinkas, B.2
-
10
-
-
78751613300
-
Link prediction in complex networks: A survey
-
Lü, L., Zhou, T.: Link prediction in complex networks: A survey. Physica A 390(6), 1150–1170 (2011)
-
(2011)
Physica A
, vol.390
, Issue.6
, pp. 1150-1170
-
-
Lü, L.1
Zhou, T.2
-
11
-
-
70350678967
-
Differentially private recommender systems: Building privacy into the Netflix prize contenders
-
McSherry, F., Mironov, I.: Differentially private recommender systems: Building privacy into the Netflix prize contenders. In: KDD 2009, pp. 627–636 (2009)
-
(2009)
KDD 2009
, pp. 627-636
-
-
McSherry, F.1
Mironov, I.2
-
12
-
-
84881255209
-
Privacy-preserving ridge regression on hundreds of millions of records
-
Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-preserving ridge regression on hundreds of millions of records. In: S&P 2013, pp. 334–348 (2013)
-
(2013)
S&P 2013
, pp. 334-348
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
13
-
-
84888987660
-
Privacy-Preserving matrix factorization
-
Nikolaenko, V., Weinsberg, U., Ioannidis, S., Joye, M., Boneh, D., Taft, N.: Privacy-Preserving matrix factorization. In: CCS 2013, pp. 801–812 (2013)
-
(2013)
CCS 2013
, pp. 801-812
-
-
Nikolaenko, V.1
Weinsberg, U.2
Ioannidis, S.3
Joye, M.4
Boneh, D.5
Taft, N.6
-
14
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Stern, J. (ed.), Springer, Heidelberg
-
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
-
(1999)
EUROCRYPT 1999. LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
15
-
-
72249112536
-
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
-
Shokri, R., Pedarsani, P., Theodorakopoulos, G., Hubaux, J.: Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. In: RecSys 2009, pp. 157–164 (2009)
-
(2009)
Recsys 2009
, pp. 157-164
-
-
Shokri, R.1
Pedarsani, P.2
Theodorakopoulos, G.3
Hubaux, J.4
-
16
-
-
0022882770
-
How to generate and exchange secrets
-
Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162–167 (1986)
-
(1986)
FOCS 1986
, pp. 162-167
-
-
Yao, A.C.1
-
17
-
-
78649953780
-
Augmenting collaborative recommender by fusing explicit social relationships
-
Yuan, Q., Zhao, S., Chen, L., et al.: Augmenting collaborative recommender by fusing explicit social relationships. In: Recsys (2009)
-
(2009)
Recsys
-
-
Yuan, Q.1
Zhao, S.2
Chen, L.3
|