-
2
-
-
1642327704
-
Secure and private sequence comparisons
-
M. J. Atallah, F. Kerschbaum, and W. Du. Secure and private sequence comparisons. In WPES, pages 39-44, 2003.
-
(2003)
WPES
, pp. 39-44
-
-
Atallah, M.J.1
Kerschbaum, F.2
Du, W.3
-
4
-
-
85135872226
-
On the marriage of lp-norms and edit distance
-
L. Chen and R. T. Ng. On the marriage of lp-norms and edit distance. In VLDB, pages 792-803, 2004.
-
(2004)
VLDB
, pp. 792-803
-
-
Chen, L.1
Ng, R.T.2
-
5
-
-
84861595370
-
Publishing set-valued data via differential privacy
-
R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. PVLDB, 4(11), 2011.
-
(2011)
PVLDB
, vol.4
, Issue.11
-
-
Chen, R.1
Mohammed, N.2
Fung, B.C.M.3
Desai, B.C.4
Xiong, L.5
-
6
-
-
84864197091
-
Differentially private spatial decompositions
-
G. Cormode, C. M. Procopiuc, D. Srivastava, E. Shen, and T. Yu. Differentially private spatial decompositions. In ICDE, pages 20-31, 2012.
-
(2012)
ICDE
, pp. 20-31
-
-
Cormode, G.1
Procopiuc, C.M.2
Srivastava, D.3
Shen, E.4
Yu, T.5
-
7
-
-
33750795715
-
Computing discrete fréchet distance
-
Technische UniversitÃd'Wien
-
T. Eiter and H. Mannila. Computing discrete fréchet distance. Technical Report CD-TR 94/64, Technische UniversitÃd'Wien, 1994.
-
(1994)
Technical Report CD-TR 94/64
-
-
Eiter, T.1
Mannila, H.2
-
8
-
-
69949163699
-
Privacy-preserving face recognition
-
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In Privacy Enhancing Technologies, pages 235-253, 2009.
-
(2009)
Privacy Enhancing Technologies
, pp. 235-253
-
-
Erkin, Z.1
Franz, M.2
Guajardo, J.3
Katzenbeisser, S.4
Lagendijk, I.5
Toft, T.6
-
9
-
-
78650518102
-
Boosting the accuracy of differentially private histograms through consistency
-
M. Hay, V. Rastogi, G. Miklau, and D. Suciu. Boosting the accuracy of differentially private histograms through consistency. PVLDB, 3(1):1021-1032, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 1021-1032
-
-
Hay, M.1
Rastogi, V.2
Miklau, G.3
Suciu, D.4
-
10
-
-
78649992236
-
Tasty: Tool for automating secure two-party computations
-
W. Henecka, S. Kögl, A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Tasty: tool for automating secure two-party computations. In CCS, pages 451-462, 2010.
-
(2010)
CCS
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.-R.3
Schneider, T.4
Wehrenberg, I.5
-
11
-
-
84863503836
-
Differentially private search log sanitization with optimal output utility
-
Y. Hong, J. Vaidya, H. Lu, and M. Wu. Differentially private search log sanitization with optimal output utility. In EDBT, pages 50-61, 2012.
-
(2012)
EDBT
, pp. 50-61
-
-
Hong, Y.1
Vaidya, J.2
Lu, H.3
Wu, M.4
-
12
-
-
79957834847
-
Processing private queries over untrusted data cloud through privacy homomorphism
-
H. Hu, J. Xu, C. Ren, and B. Choi. Processing private queries over untrusted data cloud through privacy homomorphism. In ICDE, pages 601-612, 2011.
-
(2011)
ICDE
, pp. 601-612
-
-
Hu, H.1
Xu, J.2
Ren, C.3
Choi, B.4
-
14
-
-
84923318201
-
Efficient privacy-preserving biometric identification
-
Y. Huang, L. Malka, D. Evans, and J. Katz. Efficient privacy-preserving biometric identification. In NDSS, 2011.
-
(2011)
NDSS
-
-
Huang, Y.1
Malka, L.2
Evans, D.3
Katz, J.4
-
15
-
-
52649087713
-
A hybrid approach to private record linkage
-
A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco. A hybrid approach to private record linkage. In ICDE, pages 496-505, 2008.
-
(2008)
ICDE
, pp. 496-505
-
-
Inan, A.1
Kantarcioglu, M.2
Bertino, E.3
Scannapieco, M.4
-
16
-
-
77952279809
-
Private record matching using differential privacy
-
A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino. Private record matching using differential privacy. In EDBT, pages 123-134, 2010.
-
(2010)
EDBT
, pp. 123-134
-
-
Inan, A.1
Kantarcioglu, M.2
Ghinita, G.3
Bertino, E.4
-
17
-
-
68849096248
-
Secure hamming distance based computation and its applications
-
A. Jarrous and B. Pinkas. Secure hamming distance based computation and its applications. In ACNS, pages 107-124, 2009.
-
(2009)
ACNS
, pp. 107-124
-
-
Jarrous, A.1
Pinkas, B.2
-
19
-
-
71749085624
-
Formal anonymity models for efficient privacy-preserving joins
-
M. Kantarcioglu, A. Inan, W. Jiang, and B. Malin. Formal anonymity models for efficient privacy-preserving joins. Data Knowl. Eng., 68(11):1206-1223, 2009.
-
(2009)
Data Knowl. Eng.
, vol.68
, Issue.11
, pp. 1206-1223
-
-
Kantarcioglu, M.1
Inan, A.2
Jiang, W.3
Malin, B.4
-
20
-
-
0242497349
-
Exact indexing of dynamic time warping
-
E. J. Keogh. Exact indexing of dynamic time warping. In VLDB, pages 406-417, 2002.
-
(2002)
VLDB
, pp. 406-417
-
-
Keogh, E.J.1
-
21
-
-
71549170830
-
Improved garbled circuit building blocks and applications to auctions and computing minima
-
V. Kolesnikov, A.-R. Sadeghi, and T. Schneider. Improved garbled circuit building blocks and applications to auctions and computing minima. In CANS, pages 1-20, 2009.
-
(2009)
CANS
, pp. 1-20
-
-
Kolesnikov, V.1
Sadeghi, A.-R.2
Schneider, T.3
-
22
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
V. Kolesnikov and T. Schneider. Improved garbled circuit: Free xor gates and applications. In ICALP (2), pages 486-498, 2008.
-
(2008)
ICALP (2)
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
23
-
-
84863733988
-
An adaptive mechanism for accurate query answering under differential privacy
-
C. Li and G. Miklau. An adaptive mechanism for accurate query answering under differential privacy. PVLDB, 5(6):514-525, 2012.
-
(2012)
PVLDB
, vol.5
, Issue.6
, pp. 514-525
-
-
Li, C.1
Miklau, G.2
-
25
-
-
77955176662
-
Efficient privacy-preserving similar document detection
-
M. Murugesan, W. Jiang, C. Clifton, L. Si, and J. Vaidya. Efficient privacy-preserving similar document detection. VLDB J., 19(4):457-475, 2010.
-
(2010)
VLDB J.
, vol.19
, Issue.4
, pp. 457-475
-
-
Murugesan, M.1
Jiang, W.2
Clifton, C.3
Si, L.4
Vaidya, J.5
-
26
-
-
77955178939
-
Scifi - A system for secure face identification
-
M. Osadchy, B. Pinkas, A. Jarrous, and B. Moskovich. Scifi - a system for secure face identification. In IEEE Symposium on Security and Privacy, pages 239-254, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 239-254
-
-
Osadchy, M.1
Pinkas, B.2
Jarrous, A.3
Moskovich, B.4
-
27
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT, pages 223-238, 1999.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
28
-
-
79955911586
-
Nearest neighbor search with strong location privacy
-
S. Papadopoulos, S. Bakiras, and D. Papadias. Nearest neighbor search with strong location privacy. PVLDB, 3(1):619-629, 2010.
-
(2010)
PVLDB
, vol.3
, Issue.1
, pp. 619-629
-
-
Papadopoulos, S.1
Bakiras, S.2
Papadias, D.3
-
29
-
-
84864234200
-
Privacy-preserving and content-protecting location based queries
-
R. Paulet, M. G. Kaosar, X. Yi, and E. Bertino. Privacy-preserving and content-protecting location based queries. In ICDE, pages 44-53, 2012.
-
(2012)
ICDE
, pp. 44-53
-
-
Paulet, R.1
Kaosar, M.G.2
Yi, X.3
Bertino, E.4
-
30
-
-
77954711910
-
Differentially private aggregation of distributed time-series with transformation and encryption
-
V. Rastogi and S. Nath. Differentially private aggregation of distributed time-series with transformation and encryption. In SIGMOD Conference, pages 735-746, 2010.
-
(2010)
SIGMOD Conference
, pp. 735-746
-
-
Rastogi, V.1
Nath, S.2
-
31
-
-
79956295637
-
Some notions of entropy for cryptography - (invited talk)
-
L. Reyzin. Some notions of entropy for cryptography - (invited talk). In ICITS, pages 138-142, 2011.
-
(2011)
ICITS
, pp. 138-142
-
-
Reyzin, L.1
-
32
-
-
85075489334
-
Privacy-preserving aggregation of time-series data
-
E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS, 2011.
-
(2011)
NDSS
-
-
Shi, E.1
Chan, H.T.-H.2
Rieffel, E.G.3
Chow, R.4
Song, D.5
-
33
-
-
84873108658
-
Privacy preservation by disassociation
-
M. Terrovitis, J. Liagouris, N. Mamoulis, and S. Skiadopoulos. Privacy preservation by disassociation. PVLDB, 5(10):944-955, 2012.
-
(2012)
PVLDB
, vol.5
, Issue.10
, pp. 944-955
-
-
Terrovitis, M.1
Liagouris, J.2
Mamoulis, N.3
Skiadopoulos, S.4
-
34
-
-
19544394594
-
Privacy-preserving outlier detection
-
J. Vaidya and C. Clifton. Privacy-preserving outlier detection. In ICDM, pages 233-240, 2004.
-
(2004)
ICDM
, pp. 233-240
-
-
Vaidya, J.1
Clifton, C.2
-
35
-
-
84872397385
-
Experimental comparison of representation methods and distance measures for time series data
-
X. Wang, A. Mueen, H. Ding, G. Trajcevski, P. Scheuermann, and E. J. Keogh. Experimental comparison of representation methods and distance measures for time series data. Data Min. Knowl. Discov., 26(2):275-309, 2013.
-
(2013)
Data Min. Knowl. Discov.
, vol.26
, Issue.2
, pp. 275-309
-
-
Wang, X.1
Mueen, A.2
Ding, H.3
Trajcevski, G.4
Scheuermann, P.5
Keogh, E.J.6
-
36
-
-
77952787160
-
Differential privacy via wavelet transforms
-
X. Xiao, G. Wang, and J. Gehrke. Differential privacy via wavelet transforms. In ICDE, pages 225-236, 2010.
-
(2010)
ICDE
, pp. 225-236
-
-
Xiao, X.1
Wang, G.2
Gehrke, J.3
-
37
-
-
84864195481
-
Differentially private histogram publication
-
J. Xu, Z. Zhang, X. Xiao, Y. Yang, and G. Yu. Differentially private histogram publication. In ICDE, pages 32-43, 2012.
-
(2012)
ICDE
, pp. 32-43
-
-
Xu, J.1
Zhang, Z.2
Xiao, X.3
Yang, Y.4
Yu, G.5
-
38
-
-
77956200067
-
Collusion-resistant privacy-preserving data mining
-
B. Yang, H. Nakagawa, I. Sato, and J. Sakuma. Collusion-resistant privacy-preserving data mining. In KDD, pages 483-492, 2010.
-
(2010)
KDD
, pp. 483-492
-
-
Yang, B.1
Nakagawa, H.2
Sato, I.3
Sakuma, J.4
-
39
-
-
0020312165
-
Protocols for secure computations
-
A. C.-C. Yao. Protocols for secure computations. In FOCS, pages 160-164, 1982.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
|