-
1
-
-
70350399649
-
Secure evaluation of private linear branching programs with medical applications
-
Backes, M., Ning, P. (eds.), Springer, Heidelberg
-
Barni, M., Failla, P., Kolesnikov, V., Lazzeretti, R., Sadeghi, A.-R., Schneider, T.: Secure evaluation of private linear branching programs with medical applications. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 424–439. Springer, Heidelberg (2009). doi:10.1007/978-3-642-04444-1 26
-
(2009)
ESORICS 2009. LNCS
, vol.5789
, pp. 424-439
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.-R.5
Schneider, T.6
-
2
-
-
79957487964
-
Privacy-preserving ECG classification with branching programs and neural networks
-
Barni, M., Failla, P., Lazzeretti, R., Sadeghi, A., Schneider, T.: Privacy-preserving ECG classification with branching programs and neural networks. Trans. Inf. Forensics Secur. 6(2), 452–468 (2011)
-
(2011)
Trans. Inf. Forensics Secur.
, vol.6
, Issue.2
, pp. 452-468
-
-
Barni, M.1
Failla, P.2
Lazzeretti, R.3
Sadeghi, A.4
Schneider, T.5
-
3
-
-
84905174579
-
Private predictive analysis on encrypted medical data
-
Bos, J.W., Lauter, K.E., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inform. 50, 234–243 (2014)
-
(2014)
J. Biomed. Inform.
, vol.50
, pp. 234-243
-
-
Bos, J.W.1
Lauter, K.E.2
Naehrig, M.3
-
4
-
-
85098887199
-
Machine learning classification over encrypted data
-
Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: NDSS (2015)
-
(2015)
NDSS
-
-
Bost, R.1
Popa, R.A.2
Tu, S.3
Goldwasser, S.4
-
5
-
-
71549138933
-
-
ACM CCS
-
Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: ACM CCS (2007)
-
(2007)
Privacy-Preserving Remote Diagnostics
-
-
Brickell, J.1
Porter, D.E.2
Shmatikov, V.3
Witchel, E.4
-
7
-
-
85001025766
-
Wallet databases with observers
-
Brickell, E.F. (ed.), Springer, Heidelberg
-
Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993). doi:10.1007/3-540-48071-4 7
-
(1993)
CRYPTO 1992. LNCS
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
8
-
-
85092033531
-
ABY - a framework for efficient mixed-protocol secure two-party computation
-
Demmler, D., Schneider, T., Zohner, M.: ABY - a framework for efficient mixed-protocol secure two-party computation. In: NDSS (2015)
-
(2015)
NDSS
-
-
Demmler, D.1
Schneider, T.2
Zohner, M.3
-
9
-
-
33645584057
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Du, W., Han, Y.S. Chen, S.: Privacy-preserving multivariate statistical analysis: linear regression and classification. In: SDM (2004)
-
(2004)
SDM
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
10
-
-
84954097669
-
Model inversion attacks that exploit confidence information and basic countermeasures
-
Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: ACM CCS (2015)
-
(2015)
ACM CCS
-
-
Fredrikson, M.1
Jha, S.2
Ristenpart, T.3
-
11
-
-
85055873696
-
-
USENIX Security
-
Fredrikson, M., Lantz, E., Jha, S., Lin, D., Page, D., Ristenpart, T.: Privacy in pharmacogenetics: an end-to-end case study of personalized Warfarin dosing. In: USENIX Security (2014)
-
(2014)
Privacy in Pharmacogenetics: An End-To-End Case Study of Personalized Warfarin Dosing
-
-
Fredrikson, M.1
Lantz, E.2
Jha, S.3
Lin, D.4
Page, D.5
Ristenpart, T.6
-
12
-
-
85029535271
-
Practical private DNA string searching and matching through efficient oblivious automata evaluation
-
Frikken, K.B.: Practical private DNA string searching and matching through efficient oblivious automata evaluation. In: DBSec (2009)
-
(2009)
Dbsec
-
-
Frikken, K.B.1
-
13
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Blakley, G.R., Chaum, D. (eds.), Springer, Heidelberg
-
ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985). doi:10.1007/3-540-39568-7 2
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 10-18
-
-
Elgamal, T.1
-
14
-
-
77649261628
-
A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University, Stanford, CA, USA
-
Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University, Stanford, CA, USA, AAI3382729 (2009)
-
(2009)
AAI3382729
-
-
Gentry, C.1
-
15
-
-
84876012553
-
ML confidential: Machine learning on encrypted data
-
Kwon, T., Lee, M.-K., Kwon, D. (eds.), Springer, Heidelberg
-
Graepel, T., Lauter, K., Naehrig, M.: ML confidential: machine learning on encrypted data. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 1–21. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37682-5 1
-
(2013)
ICISC 2012. LNCS
, vol.7839
, pp. 1-21
-
-
Graepel, T.1
Lauter, K.2
Naehrig, M.3
-
17
-
-
84888999950
-
Evaluating branching programs on encrypted data
-
Ishai, Y., Paskin, A.: Evaluating branching programs on encrypted data. In: TCC (2007)
-
(2007)
TCC
-
-
Ishai, Y.1
Paskin, A.2
-
18
-
-
84864081607
-
A practical differentially private random decision tree classifier
-
Jagannathan, G., Pillaipakkamnatt, K., Wright, R.N.: A practical differentially private random decision tree classifier. Trans. Data Priv. 5(1), 273–295 (2012)
-
(2012)
Trans. Data Priv
, vol.5
, Issue.1
, pp. 273-295
-
-
Jagannathan, G.1
Pillaipakkamnatt, K.2
Wright, R.N.3
-
19
-
-
84905375066
-
FleXOR: Flexible garbling for XOR Gates that beats free-XOR
-
Garay, J.A., Gennaro, R. (eds.), Springer, Heidelberg
-
Kolesnikov, V., Mohassel, P., Rosulek, M.: FleXOR: flexible garbling for XOR Gates that beats free-XOR. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014 Part II. LNCS, vol. 8617, pp. 440–457. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44381-1 25
-
(2014)
CRYPTO 2014 Part II. LNCS
, vol.8617
, pp. 440-457
-
-
Kolesnikov, V.1
Mohassel, P.2
Rosulek, M.3
-
20
-
-
49049099825
-
Improved garbled circuit: Free XOR gates and applications
-
Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.), Springer, Heidelberg
-
Kolesnikov, V., Schneider, T.: Improved garbled circuit: free XOR gates and applications. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) ICALP 2008 Part II. LNCS, vol. 5126, pp. 486–498. Springer, Heidelberg (2008). doi:10.1007/978-3-540-70583-3 40
-
(2008)
ICALP 2008 Part II. LNCS
, vol.5126
, pp. 486-498
-
-
Kolesnikov, V.1
Schneider, T.2
-
21
-
-
0034922742
-
Machine learning for medical diagnosis: History, state of the art and perspective
-
Kononenko, I.: Machine learning for medical diagnosis: history, state of the art and perspective. Artif. Intell. Med. 23(1), 89–109 (2001)
-
(2001)
Artif. Intell. Med.
, vol.23
, Issue.1
, pp. 89-109
-
-
Kononenko, I.1
-
22
-
-
84886567160
-
-
School of Information and Computer Sciences, University of California, Irvine
-
Lichman, M.: UCI machine learning repository. School of Information and Computer Sciences, University of California, Irvine (2013). http://archive.ics.uci.edu/ml
-
(2013)
UCI Machine Learning Repository
-
-
Lichman, M.1
-
23
-
-
84884490479
-
Fast cut-and-choose based protocols for malicious and covert adversaries
-
Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
-
Lindell, Y.: Fast cut-and-choose based protocols for malicious and covert adversaries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013 Part II. LNCS, vol. 8043, pp. 1–17. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40084-1 1
-
(2013)
CRYPTO 2013 Part II. LNCS
, vol.8043
, pp. 1-17
-
-
Lindell, Y.1
-
25
-
-
84924224031
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Lindell, Y., Pinkas, B.: An efficient protocol for secure two-party computation in the presence of malicious adversaries. J. Cryptol. 28(2), 312–350 (2015)
-
(2015)
J. Cryptol.
, vol.28
, Issue.2
, pp. 312-350
-
-
Lindell, Y.1
Pinkas, B.2
-
26
-
-
84865821534
-
Oblivious decision programs from oblivious transfer: Efficient reductions
-
Keromytis, A.D. (ed.), Springer, Heidelberg
-
Mohassel, P., Niksefat, S.: Oblivious decision programs from oblivious transfer: efficient reductions. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 269– 284. Springer, Heidelberg (2012). doi:10.1007/978-3-642-32946-3 20
-
(2012)
FC 2012. LNCS
, vol.7397
, pp. 269-284
-
-
Mohassel, P.1
Niksefat, S.2
-
27
-
-
84857721473
-
An efficient protocol for oblivious DFA evaluation and applications
-
Dunkelman, O. (ed.), Springer, Heidelberg
-
Mohassel, P., Niksefat, S., Sadeghian, S., Sadeghiyan, B.: An efficient protocol for oblivious DFA evaluation and applications. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 398–415. Springer, Heidelberg (2012). doi:10.1007/978-3-642-27954-6 25
-
(2012)
CT-RSA 2012. LNCS
, vol.7178
, pp. 398-415
-
-
Mohassel, P.1
Niksefat, S.2
Sadeghian, S.3
Sadeghiyan, B.4
-
28
-
-
85027164807
-
-
CoRR, abs/1611.03814
-
Papernot, N., McDaniel, P.D., Sinha, A., Wellman, M.P.: Towards the science of security and privacy in machine learning. CoRR, abs/1611.03814 (2016)
-
(2016)
Towards the Science of Security and Privacy in Machine Learning
-
-
Papernot, N.1
McDaniel, P.D.2
Sinha, A.3
Wellman, M.P.4
-
29
-
-
84913536910
-
Towards efficient privacy-preserving image feature extraction in cloud computing
-
Qin, Z., Yan, K. Ren, K., Chen, C.W., Wang, C.: Towards efficient privacy-preserving image feature extraction in cloud computing. In: ACM Multimedia (2014)
-
(2014)
ACM Multimedia
-
-
Qin, Z.1
Yan, K.2
Ren, K.3
Chen, C.W.4
Wang, C.5
-
30
-
-
84878605211
-
Methods for restricting message space in public-key encryption
-
Sakai, Y., Emura, K., Hanaoka, G., Kawai, Y., Omote, K.: Methods for restricting message space in public-key encryption. IEICE Trans. 96(6), 156–1168 (2013)
-
(2013)
IEICE Trans.
, vol.96
, Issue.6
, pp. 156-1168
-
-
Sakai, Y.1
Emura, K.2
Hanaoka, G.3
Kawai, Y.4
Omote, K.5
-
31
-
-
45749132089
-
Privacy-preserving naïve Bayes classification
-
Vaidya, J., Kantarcioglu, M., Clifton, C.: Privacy-preserving naïve Bayes classification. VLDB J. 17(4), 879–898 (2008)
-
(2008)
VLDB J
, vol.17
, Issue.4
, pp. 879-898
-
-
Vaidya, J.1
Kantarcioglu, M.2
Clifton, C.3
-
32
-
-
84874082457
-
Improving the DGK comparison protocol
-
Veugen, T.: Improving the DGK comparison protocol. In: WIFS (2012)
-
(2012)
WIFS
-
-
Veugen, T.1
-
33
-
-
85029502157
-
-
IEEE Trans. Dependable Sec. Comput
-
Wang, Q., He, M., Du, M., Chow, S.S.M., Lai, R.W.F., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Sec. Comput. (2017)
-
(2017)
Searchable Encryption over Feature-Rich Data
-
-
Wang, Q.1
He, M.2
Du, M.3
Chow, S.S.M.4
Lai, R.W.F.5
Zou, Q.6
-
34
-
-
12244255356
-
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
-
Wright, R.N., Yang, Z.: Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. In: SIGKDD (2004)
-
(2004)
SIGKDD
-
-
Wright, R.N.1
Yang, Z.2
-
35
-
-
85029574773
-
Privately evaluating decision trees and random forests
-
Wu, D.J., Feng, T., Naehrig, M., Lauter, K.: Privately evaluating decision trees and random forests. PoPETs 4, 335–355 (2016)
-
(2016)
Popets
, vol.4
, pp. 335-355
-
-
Wu, D.J.1
Feng, T.2
Naehrig, M.3
Lauter, K.4
|