-
2
-
-
84897781978
-
Innovative technology for CPU based attestation and sealing
-
ANATI, I., GUERON, S., JOHNSON, S., AND SCARLATA, V. Innovative technology for CPU based attestation and sealing. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP) (2013).
-
(2013)
Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
-
-
Anati, I.1
Gueron, S.2
Johnson, S.3
Scarlata, V.4
-
3
-
-
85084014165
-
Orthogonal security with Cipherbase
-
ARASU, A., BLANAS, S., EGURO, K., KAUSHIK, R., KOSSMANN, D., RAMAMURTHY, R., AND VENKATESAN, R. Orthogonal security with Cipherbase. In Conference on Innovative Data Systems Research (CIDR) (2013).
-
(2013)
Conference on Innovative Data Systems Research (CIDR)
-
-
Arasu, A.1
Blanas, S.2
Eguro, K.3
Kaushik, R.4
Kossmann, D.5
Ramamurthy, R.6
Venkatesan, R.7
-
6
-
-
85049224675
-
Secure evaluation of private linear branching programs with medical applications
-
BARNI, M., FAILLA, P., KOLESNIKOV, V., LAZZERETTI, R., SADEGHI, A., AND SCHNEIDER, T. Secure evaluation of private linear branching programs with medical applications. In European Symposium on Research in Computer Security (ESORICS) (2009).
-
(2009)
European Symposium on Research in Computer Security (ESORICS)
-
-
Barni, M.1
Failla, P.2
Kolesnikov, V.3
Lazzeretti, R.4
Sadeghi, A.5
Schneider, T.6
-
11
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: The SuLQ framework. In ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS) (2005).
-
(2005)
ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
13
-
-
84948821062
-
Machine learning classification over encrypted data
-
BOST, R., POPA, R. A., TU, S., AND GOLDWASSER, S. Machine learning classification over encrypted data. In Symposium on Network and Distributed System Security (NDSS) (2015).
-
(2015)
Symposium on Network and Distributed System Security (NDSS)
-
-
Bost, R.1
Popa, R.A.2
Tu, S.3
Goldwasser, S.4
-
15
-
-
0003802343
-
-
Wadsworth
-
BREIMAN, L., FRIEDMAN, J. H., OLSHEN, R. A., AND STONE, C. J. Classification and Regression Trees. Wadsworth, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
16
-
-
84859414659
-
Decision forests: A unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning
-
CRIMINISI, A., SHOTTON, J., AND KONUKOGLU, E. Decision forests: A unified framework for classification, regression, density estimation, manifold learning and semi-supervised learning. Foundations and Trends in Computer Graphics and Vision 7, 2-3 (2012).
-
(2012)
Foundations and Trends in Computer Graphics and Vision
, vol.7
, pp. 2-3
-
-
Criminisi, A.1
Shotton, J.2
Konukoglu, E.3
-
18
-
-
85071723718
-
Practical secure decision tree learning in a teletreatment application
-
DE HOOGH, S., SCHOENMAKERS, B., CHEN, P., AND OP DEN AKKER, H. Practical secure decision tree learning in a teletreatment application. In Financial Cryptography and Data Security (FC) (2014).
-
(2014)
Financial Cryptography and Data Security (FC)
-
-
de Hoogh, S.1
Schoenmakers, B.2
Chen, P.3
Op Den Akker, H.4
-
19
-
-
33746086554
-
Calibrating noise to sensitivity in private data analysis
-
DWORK, C., MCSHERRY, F., NISSIM, K., AND SMITH, A. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference (TCC) (2006).
-
(2006)
Theory of Cryptography Conference (TCC)
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
20
-
-
85076457282
-
-
accessed 17/02/2016
-
Fast CNN library. http://fastcnn.codeplex.com/ (accessed 17/02/2016).
-
Fast CNN Library
-
-
-
22
-
-
85055873696
-
Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing
-
FREDRIKSON, M., LANTZ, E., JHA, S., LIN, S., PAGE, D., AND RISTENPART, T. Privacy in pharmacogenetics: An end-to-end case study of personalized warfarin dosing. In USENIX Security Symposium (2014).
-
(2014)
USENIX Security Symposium
-
-
Fredrikson, M.1
Lantz, E.2
Jha, S.3
Lin, S.4
Page, D.5
Ristenpart, T.6
-
25
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious RAMs. Journal of the ACM (JACM) 43, 3 (1996).
-
(1996)
Journal of the ACM (JACM)
, vol.43
, pp. 3
-
-
Goldreich, O.1
Ostrovsky, R.2
-
29
-
-
84914168458
-
Using innovative instructions to create trustworthy software solutions
-
HOEKSTRA, M., LAL, R., PAPPACHAN, P., ROZAS, C., PHEGADE, V., AND DEL CUVILLO, J. Using innovative instructions to create trustworthy software solutions. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP) (2013).
-
(2013)
Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
-
-
Hoekstra, M.1
Lal, R.2
Pappachan, P.3
Rozas, C.4
Phegade, V.5
Del Cuvillo, J.6
-
31
-
-
34447569672
-
-
INTEL CORP. volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c, 325462-048
-
INTEL CORP. Intel 64 and IA-32 architectures software developer’s manual—combined volumes: 1, 2a, 2b, 2c, 3a, 3b and 3c, 2013. No. 325462-048.
-
(2013)
Intel 64 and IA-32 Architectures Software Developer’S Manual—Combined
-
-
-
32
-
-
85008044987
-
Matrix factorization techniques for recommender systems
-
KOREN, Y., BELL, R., AND VOLINSKY, C. Matrix factorization techniques for recommender systems. Computer, 8 (2009).
-
(2009)
Computer
, vol.8
-
-
Koren, Y.1
Bell, R.2
Volinsky, C.3
-
36
-
-
70350390430
-
Secure multiparty computation for privacy-preserving data mining
-
LINDELL, Y., AND PINKAS, B. Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive (2008).
-
(2008)
IACR Cryptology ePrint Archive
-
-
Lindell, Y.1
Pinkas, B.2
-
37
-
-
84939198646
-
Ghostrider: A hardware-software system for memory trace oblivious computation
-
LIU, C., HARRIS, A., MAAS, M., HICKS, M. W., TIWARI, M., AND SHI, E. Ghostrider: A hardware-software system for memory trace oblivious computation. In International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2015).
-
(2015)
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
-
-
Liu, C.1
Harris, A.2
Maas, M.3
Hicks, M.W.4
Tiwari, M.5
Shi, E.6
-
38
-
-
84945182982
-
ObliVM: A programming framework for secure computation
-
LIU, C., WANG, X. S., NAYAK, K., HUANG, Y., AND SHI, E. ObliVM: A programming framework for secure computation. In IEEE Symposium on Security and Privacy (S&P) (2015).
-
(2015)
IEEE Symposium on Security and Privacy (S&P)
-
-
Liu, C.1
Wang, X.S.2
Nayak, K.3
Huang, Y.4
Shi, E.5
-
39
-
-
84945191701
-
Last-level cache side-channel attacks are practical
-
LIU, F., YAROM, Y., GE, Q., HEISER, G., AND LEE, R. B. Last-level cache side-channel attacks are practical. In IEEE Symposium on Security and Privacy (S&P) (2015).
-
(2015)
IEEE Symposium on Security and Privacy (S&P)
-
-
Liu, F.1
Yarom, Y.2
Ge, Q.3
Heiser, G.4
Lee, R.B.5
-
42
-
-
31944440969
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
LUK, C.-K., COHN, R., MUTH, R., PATIL, H., KLAUSER, A., LOWNEY, G., WALLACE, S., REDDI, V. J., AND HAZELWOOD, K. Pin: Building customized program analysis tools with dynamic instrumentation. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2005).
-
(2005)
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Luk, C.-K.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.J.8
Hazelwood, K.9
-
44
-
-
85084163840
-
Fairplay: A secure two party computation system
-
MALKHI, D., NISAN, N., PINKAS, B., AND SELLA, Y. Fairplay: a secure two party computation system. In USENIX Security Symposium (2004).
-
(2004)
USENIX Security Symposium
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
45
-
-
84893423195
-
Innovative instructions and software model for isolated execution
-
MCKEEN, F., ALEXANDROVICH, I., BERENZON, A., ROZAS, C., SHAFI, H., SHANBHOGUE, V., AND SAVAGAONKAR, U. Innovative instructions and software model for isolated execution. In Workshop on Hardware and Architectural Support for Security and Privacy (HASP) (2013).
-
(2013)
Workshop on Hardware and Architectural Support for Security and Privacy (HASP)
-
-
McKeen, F.1
Alexandrovich, I.2
Berenzon, A.3
Rozas, C.4
Shafi, H.5
Shanbhogue, V.6
Savagaonkar, U.7
-
47
-
-
84945191638
-
GraphSC: Parallel secure computation made easy
-
NAYAK, K., WANG, X. S., IOANNIDIS, S., WEINSBERG, U., TAFT, N., AND SHI, E. GraphSC: Parallel secure computation made easy. In IEEE Symposium on Security and Privacy (S&P) (2015).
-
(2015)
IEEE Symposium on Security and Privacy (S&P)
-
-
Nayak, K.1
Wang, X.S.2
Ioannidis, S.3
Weinsberg, U.4
Taft, N.5
Shi, E.6
-
48
-
-
84888987660
-
Privacy-preserving matrix factorization
-
NIKOLAENKO, V., IOANNIDIS, S., WEINSBERG, U., JOYE, M., TAFT, N., AND BONEH, D. Privacy-preserving matrix factorization. In ACM Conference on Computer and Communications Security (CCS) (2013).
-
(2013)
ACM Conference on Computer and Communications Security (CCS)
-
-
Nikolaenko, V.1
Ioannidis, S.2
Weinsberg, U.3
Joye, M.4
Taft, N.5
Boneh, D.6
-
49
-
-
84954121691
-
Observing and preventing leakage in MapReduce
-
OHRIMENKO, O., COSTA, M., FOURNET, C., GKANTSIDIES, C., KOHLWEISS, M., AND SHARMA, D. Observing and preventing leakage in MapReduce. In ACM Conference on Computer and Communications Security (CCS) (2015).
-
(2015)
ACM Conference on Computer and Communications Security (CCS)
-
-
Ohrimenko, O.1
Costa, M.2
Fournet, C.3
Gkantsidies, C.4
Kohlweiss, M.5
Sharma, D.6
-
50
-
-
84904183905
-
The Melbourne shuffle: Improving oblivious storage in the cloud
-
Springer
-
OHRIMENKO, O., GOODRICH, M. T., TAMASSIA, R., AND UPFAL, E. The Melbourne shuffle: Improving oblivious storage in the cloud. In International Colloquium on Automata, Languages and Programming (ICALP), vol. 8573. Springer, 2014.
-
(2014)
International Colloquium on Automata, Languages and Programming (ICALP)
, vol.8573
-
-
Ohrimenko, O.1
Goodrich, M.T.2
Tamassia, R.3
Upfal, E.4
-
51
-
-
33744584654
-
Induction of decision trees
-
QUINLAN, J. R. Induction of decision trees. Machine Learning 1, 1 (1986).
-
(1986)
Machine Learning
, vol.1
, pp. 1
-
-
Quinlan, J.R.1
-
53
-
-
85076285042
-
Raccoon: Closing digital side-channels through obfuscated execution
-
RANE, A., LIN, C., AND TIWARI, M. Raccoon: Closing digital side-channels through obfuscated execution. In USENIX Security Symposium (2015).
-
(2015)
USENIX Security Symposium
-
-
Rane, A.1
Lin, C.2
Tiwari, M.3
-
54
-
-
84914124819
-
Wysteria: A programming language for generic, mixed-mode multiparty computations
-
RASTOGI, A., HAMMER, M. A., AND HICKS, M. Wysteria: A programming language for generic, mixed-mode multiparty computations. In IEEE Symposium on Security and Privacy (S&P) (2014).
-
(2014)
IEEE Symposium on Security and Privacy (S&P)
-
-
Rastogi, A.1
Hammer, M.A.2
Hicks, M.3
-
55
-
-
0013312710
-
Application of dimensionality reduction in recommender system – A case study
-
SARWAR, B., KARYPIS, G., KONSTAN, J., AND RIEDL, J. Application of dimensionality reduction in recommender system – A case study. Tech. rep., DTIC Document, 2000.
-
(2000)
Tech. Rep., DTIC Document
-
-
Sarwar, B.1
Karypis, G.2
Konstan, J.3
Riedl, J.4
-
56
-
-
0004094721
-
-
MIT press
-
SCHÖLKOPF, B., AND SMOLA, A. J. Learning with kernels: support vector machines, regularization, optimization, and beyond. MIT press, 2002.
-
(2002)
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and beyond
-
-
Schölkopf, B.1
Smola, A.J.2
-
57
-
-
84945188553
-
VC3: Trustworthy data analytics in the cloud using sgx
-
SCHUSTER, F., COSTA, M., FOURNET, C., GKANTSIDIS, C., PEINADO, M., MAINAR-RUIZ, G., AND RUSSINOVICH, M. VC3: Trustworthy data analytics in the cloud using sgx. In IEEE Symposium on Security and Privacy (S&P) (2015).
-
(2015)
IEEE Symposium on Security and Privacy (S&P)
-
-
Schuster, F.1
Costa, M.2
Fournet, C.3
Gkantsidis, C.4
Peinado, M.5
Mainar-Ruiz, G.6
Russinovich, M.7
-
58
-
-
79952748054
-
Pegasos: Primal estimated sub-gradient solver for SVM
-
SHALEV-SHWARTZ, S., SINGER, Y., SREBRO, N., AND COTTER, A. Pegasos: Primal estimated sub-gradient solver for SVM. Mathematical programming 127, 1 (2011).
-
(2011)
Mathematical Programming
, vol.127
, pp. 1
-
-
Shalev-Shwartz, S.1
Singer, Y.2
Srebro, N.3
Cotter, A.4
-
60
-
-
84975842834
-
A design and verification methodology for secure isolated regions
-
SINHA, R., COSTA, M., LAL, A., LOPES, N., SESHIA, S., RAJAMANI, S., AND VASWANI, K. A design and verification methodology for secure isolated regions. In ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI) (2016).
-
(2016)
ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
-
-
Sinha, R.1
Costa, M.2
Lal, A.3
Lopes, N.4
Seshia, S.5
Rajamani, S.6
Vaswani, K.7
-
62
-
-
84889005645
-
Path ORAM: An extremely simple oblivious RAM protocol
-
STEFANOV, E., VAN DIJK, M., SHI, E., FLETCHER, C. W., REN, L., YU, X., AND DEVADAS, S. Path ORAM: an extremely simple oblivious RAM protocol. In ACM Conference on Computer and Communications Security (CCS) (2013).
-
(2013)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stefanov, E.1
van Dijk, M.2
Shi, E.3
Fletcher, C.W.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
63
-
-
24944537843
-
Large margin methods for structured and interdependent output variables
-
TSOCHANTARIDIS, I., JOACHIMS, T., HOF-MANN, T., AND ALTUN, Y. Large margin methods for structured and interdependent output variables. In Journal of Machine Learning Research (2005).
-
(2005)
Journal of Machine Learning Research
-
-
Tsochantaridis, I.1
Joachims, T.2
Hof-Mann, T.3
Altun, Y.4
-
64
-
-
84978378545
-
Processing analytical queries over encrypted data
-
TU, S., KAASHOEK, M. F., MADDEN, S., AND ZELDOVICH, N. Processing analytical queries over encrypted data. In International Conference on Very Large Data Bases (VLDB) (2013).
-
(2013)
International Conference on Very Large Data Bases (VLDB)
-
-
Tu, S.1
Kaashoek, M.F.2
Madden, S.3
Zeldovich, N.4
-
66
-
-
84910678637
-
Oblivious data structures
-
WANG, X. S., NAYAK, K., LIU, C., CHAN, T., SHI, E., STEFANOV, E., AND HUANG, Y. Oblivious data structures. In ACM Conference on Computer and Communications Security (CCS) (2014).
-
(2014)
ACM Conference on Computer and Communications Security (CCS)
-
-
Wang, X.S.1
Nayak, K.2
Liu, C.3
Chan, T.4
Shi, E.5
Stefanov, E.6
Huang, Y.7
-
67
-
-
0006472145
-
Support vector machines for multi-class pattern recognition
-
WESTON, J., AND WATKINS, C. Support vector machines for multi-class pattern recognition. In ESANN (1999).
-
(1999)
ESANN
-
-
Weston, J.1
Watkins, C.2
-
68
-
-
84977182456
-
Privately evaluating decision trees and random forests
-
WU, D. J., FENG, T., NAEHRIG, M., AND LAUTER, K. Privately evaluating decision trees and random forests. IACR Cryptology ePrint Archive (2015).
-
(2015)
IACR Cryptology ePrint Archive
-
-
Wu, D.J.1
Feng, T.2
Naehrig, M.3
Lauter, K.4
-
69
-
-
85061722864
-
Crypto-nets: Neural networks over encrypted data
-
abs/1412.6181
-
XIE, P., BILENKO, M., FINLEY, T., GILADBACHRACH, R., LAUTER, K. E., AND NAEHRIG, M. Crypto-nets: Neural networks over encrypted data. CoRR abs/1412.6181 (2014).
-
(2014)
CoRR
-
-
Xie, P.1
Bilenko, M.2
Finley, T.3
Giladbachrach, R.4
Lauter, K.E.5
Naehrig, M.6
-
70
-
-
84945197313
-
Controlled-channel attacks: Deterministic side channels for untrusted operating systems
-
XU, Y., CUI, W., AND PEINADO, M. Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In IEEE Symposium on Security and Privacy (S&P) (2015).
-
(2015)
IEEE Symposium on Security and Privacy (S&P)
-
-
Xu, Y.1
Cui, W.2
Peinado, M.3
|