|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1182 occurrences of 516 keywords
|
|
|
Results
Found 12989 publication records. Showing 12989 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
162 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
67 | Chai Wah Wu |
Privacy preserving data mining with unidirectional interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5521-5524, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Rafail Ostrovsky, William E. Skeith III |
Private Searching on Streaming Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 223-240, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Crypto-computing, Public-key Encryption with special properties, Privacy-Preserving Keyword Search, Secure Algorithms for Streaming Data, Privacy-Preserving Datamining, Secure Delegation of Computation, Searching with Privacy, Software security, Mobile code, Database security, Private Information Retrieval, Code Obfuscation |
66 | Shipeng Yu, Glenn Fung, Rómer Rosales, Sriram Krishnan, R. Bharat Rao, Cary Dehing-Oberije, Philippe Lambin |
Privacy-preserving cox regression for survival analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 1034-1042, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cox regression, privacy-preserving data mining, survival analysis |
66 | Xiaoyi Yu, Noboru Babaguchi |
Privacy Preserving: Hiding a Face in a Face. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACCV (2) ![In: Computer Vision - ACCV 2007, 8th Asian Conference on Computer Vision, Tokyo, Japan, November 18-22, 2007, Proceedings, Part II, pp. 651-661, 2007, Springer, 978-3-540-76389-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data Hiding, Privacy Preserving, Active Appearance Model |
64 | Alfredo Cuzzocrea, Vincenzo Russo, Domenico Saccà |
A Robust Sampling-Based Framework for Privacy Preserving OLAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 10th International Conference, DaWaK 2008, Turin, Italy, September 2-5, 2008, Proceedings, pp. 97-114, 2008, Springer, 978-3-540-85835-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Shuguo Han, Wee Keong Ng |
Privacy-Preserving Self-Organizing Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 9th International Conference, DaWaK 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 428-437, 2007, Springer, 978-3-540-74552-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Huidong Jin 0001 |
Practical Issues on Privacy-Preserving Health Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 64-75, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data anonymisation, privacy inference, health data privacy, encryption, secure multiparty computation |
64 | Somesh Jha, Louis Kruger, Patrick D. McDaniel |
Privacy Preserving Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 397-417, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Dong Seong Kim 0001, Muhammad Anwarul Azim, Jong Sou Park |
Privacy Preserving Support Vector Machines in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1260-1265, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, data mining, Sensor networks, energy efficiency, privacy preserving data mining |
62 | Zhiqiang Yang, Rebecca N. Wright |
Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(9), pp. 1253-1264, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bayesian networks, privacy-preserving data mining, Data privacy |
62 | Kun Liu 0001, Hillol Kargupta, Jessica Ryan |
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(1), pp. 92-106, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multiplicative data perturbation, privacy preserving data mining, Random projection |
62 | Rebecca N. Wright, Zhiqiang Yang |
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, Washington, USA, August 22-25, 2004, pp. 713-718, 2004, ACM, 1-58113-888-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Bayesian network, distributed databases, privacy-preserving data mining |
62 | Jianping Fan 0001, Hangzai Luo, Mohand-Said Hacid, Elisa Bertino |
A novel approach for privacy-preserving video sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 609-616, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privacy-preserving video sharing, video content privacy, statistical inferences, unlabeled samples |
62 | Omar Hasan, Lionel Brunie |
Privacy Preserving Reputation Management in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 245-280, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
62 | Charu C. Aggarwal, Philip S. Yu |
A Survey of Randomization Methods for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 137-156, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Kobbi Nissim |
Private Data Analysis via Output Perturbation - A Rigorous Approach to Constructing Sanitizers and Privacy Preserving Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 383-414, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Elisa Bertino, Dan Lin 0001, Wei Jiang |
A Survey of Quantification of Privacy Preserving Data Mining Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 183-205, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Yabo Xu, Ke Wang 0001, Ada Wai-Chee Fu, Rong She, Jian Pei |
Privacy-Preserving Data Stream Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 487-510, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Jaideep Vaidya |
A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 337-358, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Charu C. Aggarwal, Philip S. Yu |
An Introduction to Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 1-9, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Ming Hua 0001, Jian Pei |
A Survey of Utility-based Privacy-Preserving Data Transformation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 207-237, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Charu C. Aggarwal, Philip S. Yu |
A General Survey of Privacy-Preserving Data Mining Models and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 11-52, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Kun Liu 0001, Chris Giannella, Hillol Kargupta |
A Survey of Attack Techniques on Privacy-Preserving Data Perturbation Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 359-381, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Murat Kantarcioglu |
A Survey of Privacy-Preserving Methods Across Horizontally Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 313-335, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Josep Domingo-Ferrer |
A Survey of Inference Control Methods for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 53-80, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Keke Chen, Ling Liu 0001 |
A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 157-181, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Quynh Chi Truong, Anh Tuan Truong, Tran Khanh Dang |
Privacy preserving through a memorizing algorithm in location-based services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 146-153, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
memorizing algorithm, privacy preserving in data mining, location-based services, privacy preserving, location privacy, legal aspects |
61 | Wen Jin, Rong Ge 0002, Weining Qian |
On Robust and Effective K-Anonymity in Large Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 10th Pacific-Asia Conference, PAKDD 2006, Singapore, April 9-12, 2006, Proceedings, pp. 621-636, 2006, Springer, 3-540-33206-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Kambiz Ghazinour, Maryam Majedi, Ken Barker 0001 |
A Lattice-Based Privacy Aware Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 154-159, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Youwen Zhu, Liusheng Huang, Wei Yang 0011, Dong Li, Yonglong Luo, Fan Dong |
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 554-558, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
59 | Aggelos Kiayias, Shouhuai Xu, Moti Yung |
Privacy Preserving Data Mining within Anonymous Credential Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 57-76, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
59 | Z. Yu, N. Zhang |
Achieving Privacy-preserving Computation on Data Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 763-768, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Haimonti Dutta, Hillol Kargupta, Souptik Datta, Krishnamoorthy Sivakumar |
Analysis of privacy preserving random perturbation techniques: further explorations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003, pp. 31-38, 2003, ACM, 1-58113-776-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, privacy, random-perturbation |
59 | Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamoorthy Sivakumar |
Random-data perturbation techniques and privacy-preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 7(4), pp. 387-414, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Security, Data mining, Privacy, Random perturbation |
58 | Mahir Can Doganay, Thomas Brochmann Pedersen, Yücel Saygin, Erkay Savas, Albert Levi |
Distributed privacy preserving k-means clustering with additive secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAIS ![In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS 2008, Nantes, France, March 29, 2008, pp. 3-11, 2008, ACM, 978-1-59593-965-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secret sharing, k-means clustering, privacy preserving data mining, secure multiparty computation |
57 | Wenliang Du, Mikhail J. Atallah |
Secure multi-party computation problems and their applications: a review and open problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001, pp. 13-22, 2001, ACM, 1-58113-457-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
privacy, secure multi-party computation |
56 | Keon-Myung Lee, Jee-Hyong Lee 0001, Myung-Geun Chun |
Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 1028-1035, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Eigth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2009, June 19 - July 1, 2009, Providence, Rhode Island, USA, pp. 107-116, 2009, ACM, 978-1-60558-553-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
55 | Marcin Gorawski, Szymon Panfil |
A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 522-527, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Elisa Bertino, Igor Nai Fovino, Loredana Parasiliti Provenza |
A Framework for Evaluating Privacy Preserving Data Mining Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 11(2), pp. 121-154, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Hillol Kargupta, Souptik Datta, Qi Wang, Krishnamoorthy Sivakumar |
On the Privacy Preserving Properties of Random Data Perturbation Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 19-22 December 2003, Melbourne, Florida, USA, pp. 99-106, 2003, IEEE Computer Society, 0-7695-1978-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Xiaodan Wu, Chao-Hsien Chu, Yunfeng Wang, Fengli Liu, Dianmin Yue |
Privacy Preserving Data Mining Research: Current Status and Key Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part III, pp. 762-772, 2007, Springer, 978-3-540-72587-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
data mining, Privacy preserving |
54 | Shaofei Wu, Hui Wang |
Research on the Privacy Preserving Algorithm of Association Rule Mining in Centralized Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 131-134, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Mining, Privacy Preserving, Restrictive |
54 | Weijiang Xu, Weiwei Jing, Liusheng Huang, Yifei Yao |
Privacy-preserving collision detection of two circles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 73, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
collision detection, privacy-preserving, secure multi-party computation |
54 | Anour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo |
PRBAC: An Extended Role Based Access Control for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 68-73, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RBAC, Privacy preserving data mining |
54 | Hangzai Luo, Jianping Fan 0001, Xiaodong Lin 0004, Aoying Zhou, Elisa Bertino |
A distributed approach to enabling privacy-preserving model-based classifier training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 20(2), pp. 157-185, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-preserving classifier training, Synthetic samples, Adaptive EM algorithm |
54 | Stephen S. Yau, Yin Yin |
Controlled privacy preserving keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 321-324, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, privacy preserving, keyword search |
53 | Rafae Bhatti, Tyrone Grandison |
Towards Improved Privacy Policy Coverage in Healthcare Using Policy Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 158-173, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Refinement, Healthcare, Compliance, HIPAA, Privacy Management |
53 | Yi Ren, Min Luo, Zukai Tang, Lingqing Ye |
A Composite Privacy Protection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 380-395, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection |
52 | Shyue-Liang Wang, Dipen Patel, Ayat Jafari, Tzung-Pei Hong |
Hiding collaborative recommendation association rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 27(1), pp. 67-77, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Association rule, Privacy preserving data mining, Collaborative recommendation |
51 | Serena Villata, Luca Costabello, Fabien Gandon, Catherine Faron-Zucker, Michel Buffa |
Social Semantic Network-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 157-191, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Ariel Soares Teles, Francisco José Silva, Romulo de Carvalho Batista |
Security and Privacy Issues in Mobile Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 281-313, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Abdallah A. Mohamed, Roman V. Yampolskiy |
Avatar Facial Biometric Authentication Using Wavelet Local Binary Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 317-335, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Shah Mahmood |
Online Social Networks and Terrorism: Threats and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 73-94, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Ramzi A. Haraty, Sally Massalkhy |
UPP+: A Flexible User Privacy Policy for Social Networking Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 139-155, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Elie Raad, Richard Chbeir |
Privacy in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 3-45, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Mohamed Jawad, Patricia Serrano-Alvarado, Patrick Valduriez |
Supporting Data Privacy in P2P Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 195-244, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda |
User-Managed Access Control in Web Based Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 97-137, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Bechara al Bouna, Richard Chbeir, Alban Gabillon, Patrick Capolsini |
A Flexible Image-Based Access Control Model for Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 337-364, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Shah Mahmood |
Online Social Networks: Privacy Threats and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Privacy Preserving in Social Networks ![In: Security and Privacy Preserving in Social Networks, pp. 47-71, 2013, Springer, 978-3-7091-0893-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
51 | Jayant R. Haritsa |
Mining Association Rules under Privacy Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 239-266, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Suresh Venkatasubramanian |
Measures of Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 81-103, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Stephen E. Fienberg, Aleksandra B. Slavkovic |
A Survey of Statistical Approaches to Preserving Confidentiality of Contingency Table Entries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 291-312, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati |
k -Anonymous Data Mining: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 105-136, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Charu C. Aggarwal |
Privacy and the Dimensionality Curse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 433-460, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Yufei Tao 0001, Xiaokui Xiao |
Personalized Privacy Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 461-485, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Shubha U. Nabar, Krishnaram Kenthapadi, Nina Mishra, Rajeev Motwani 0001 |
A Survey of Query Auditing Techniques for Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 415-431, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Vassilios S. Verykios, Aris Gkoulalas-Divanis |
A Survey of Association Rule Hiding Methods for Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy-Preserving Data Mining ![In: Privacy-Preserving Data Mining - Models and Algorithms, pp. 267-289, 2008, Springer, 978-0-387-70991-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Jun Sakuma, Rebecca N. Wright |
Privacy-Preserving Evaluation of Generalization Error and Its Application to Model and Attribute Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACML ![In: Advances in Machine Learning, First Asian Conference on Machine Learning, ACML 2009, Nanjing, China, November 2-4, 2009. Proceedings, pp. 338-353, 2009, Springer, 978-3-642-05223-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Feng Zhang 0012, Gansen Zhao, Tingyan Xing |
Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, 5th International Conference, ADMA 2009, Beijing, China, August 17-19, 2009. Proceedings, pp. 755-762, 2009, Springer, 978-3-642-03347-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-reserving Data Mining, k -NN Mining, Probabilistic Cryptosystem, Communicative Cryptosystem, Secure Multi-party Computation |
51 | Anrong Xue, Xiqiang Duan, Handa Ma, Weihe Chen, Shiguang Ju |
Privacy Preserving Spatial Outlier Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 714-719, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Ali Inan, Yücel Saygin, Erkay Savas, Ayça Azgin Hintoglu, Albert Levi |
Privacy Preserving Clustering on Horizontally Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 95, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
51 | Zhiqiang Yang, Rebecca N. Wright |
Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1196, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
51 | Li Liu, Bhavani Thuraisingham |
The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 507-512, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Keng-Pei Lin, Ming-Syan Chen |
Privacy-preserving outsourcing support vector machines with random transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 363-372, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
classification, support vector machines, outsourcing, privacy-preserving data mining |
50 | Giuseppe Bianchi 0001, Simone Teofili, Matteo Pomposini |
New directions in privacy-preserving anomaly detection for network traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDA ![In: Proceedings of the 1st ACM workshop on Network Data Anonymization, NDA 2008, Alexandria, VA, USA, October 31, 2008, pp. 11-18, 2008, ACM, 978-1-60558-301-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
counting bloom filters, anomaly detection, privacy-preserving, traffic measurement |
50 | Qingkai Ma, Ping Deng |
Secure Multi-party Protocols for Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, Third International Conference, WASA 2008, Dallas, TX, USA, October 26-28, 2008. Proceedings, pp. 526-537, 2008, Springer, 978-3-540-88581-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy preserving data mining, secure multiparty computation |
50 | Marina Blanton, Mikhail J. Atallah |
Succinct representation of flexible and privacy-preserving access rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 334-354, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Privacy-preserving access rights, Flexible access rights, Compact representation |
50 | Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen |
On Private Scalar Product Computation for Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 104-120, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
private scalar product protocol, vertically partitioned frequent pattern mining, Privacy-preserving data mining |
50 | Meena Dilip Singh, P. Radha Krishna 0001, Ashutosh Saxena |
A cryptography based privacy preserving solution to mine cloud data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 3rd Bangalore Annual Compute Conference, Compute 2010, Bangalore, India, January 22-23, 2010, pp. 14:1-14:4, 2010, ACM, 978-1-4503-0001-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
encrypted data, private equality test, cryptography, privacy preserving data mining |
49 | Elisa Bertino |
Purpose Based Access Control for Privacy Protection in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 10th International Conference, DASFAA 2005, Beijing, China, April 17-20, 2005, Proceedings, pp. 2, 2005, Springer, 3-540-25334-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Michael J. Freedman, Yuval Ishai, Benny Pinkas, Omer Reingold |
Keyword Search and Oblivious Pseudorandom Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 303-324, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Secure keyword search, oblivious pseudorandom functions, secure two-party protocols, private information retrieval, privacy-preserving protocols |
47 | Charu C. Aggarwal, Philip S. Yu |
On static and dynamic methods for condensation-based privacy-preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 33(1), pp. 2:1-2:39, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
databases data mining, Privacy, k-anonymity |
47 | Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao |
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 315-324, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqiang Yang |
Experimental Analysis of Privacy-Preserving Statistics Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 55-66, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Charu C. Aggarwal, Philip S. Yu |
A Condensation Approach to Privacy Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT 2004, 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 2004, Proceedings, pp. 183-199, 2004, Springer, 3-540-21200-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 119-128, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
47 | Vishal Kapoor, Pascal Poncelet, François Trousset, Maguelonne Teisseire |
Privacy preserving sequential pattern mining in distributed databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, Arlington, Virginia, USA, November 6-11, 2006, pp. 758-767, 2006, ACM, 1-59593-433-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy mining |
47 | Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani Thuraisingham |
PP-trust-X: A system for privacy preserving trust negotiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(3), pp. 12, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, Access control, strategy, credentials, attribute-based access control, automated trust negotiation |
47 | Elisa Bertino, Ji-Won Byun, Ninghui Li |
Privacy-Preserving Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 178-206, 2005, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Qingsong Ye, Huaxiong Wang, Christophe Tartary |
Privacy-Preserving Distributed Set Intersection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1332-1339, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy-preserving set intersection, homomorphic encryption |
46 | Qin-Hua Huang |
Privacy Preserving Sequential Pattern Mining in Data Stream. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 69-75, 2008, Springer, 978-3-540-85929-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data mining, Data stream, Privacy preserving |
46 | Vincent Yan Fu Tan, See-Kiong Ng |
Generic Probability Density Function Reconstruction for Randomization in Privacy-Preserving Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLDM ![In: Machine Learning and Data Mining in Pattern Recognition, 5th International Conference, MLDM 2007, Leipzig, Germany, July 18-20, 2007, Proceedings, pp. 76-90, 2007, Springer, 978-3-540-73498-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Randomization, Quadratic Programming, Privacy-preserving data mining, Convex Set, Parzen-Windows |
46 | Weiwei Jing, Liusheng Huang, Yifei Yao, Weijiang Xu |
Privacy-preserving statistical quantitative rules mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 68, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
statistical quantitative rules, privacy-preserving data mining |
46 | Maithili Narasimha, John Solis, Gene Tsudik |
Privacy-preserving revocation checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 61-75, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Privacy-preserving revocation checking, Anonymity and privacy, Certificate revocation trees, Revocation, Certificate revocation lists |
46 | Jun-Lin Lin, Julie Yu-Chih Liu |
Privacy preserving itemset mining through fake transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 375-379, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
association rules, privacy preserving data mining |
46 | Stephen S. Yau, Junwei Liu |
A Situation-aware Access Control based Privacy-Preserving Service Matchmaking Approach for Service-Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 1056-1063, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SOA-based systems, situationaware access control, Service-oriented architecture, privacy-preserving, service matchmaking |
46 | Chunhua Su, Feng Bao 0001, Jianying Zhou 0001, Tsuyoshi Takagi, Kouichi Sakurai |
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 385-391, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure approximation, clustering, privacy-preserving |
46 | Songtao Guo, Xintao Wu |
On the use of spectral filtering for privacy preserving data mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 622-626, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
disclosure analysis, privacy preserving, spectral filtering |
Displaying result #1 - #100 of 12989 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|