Private Information Extraction over Online Social Networks
暂无分享,去创建一个
[1] Liao Li,et al. Intervals design for economic variable's range and its application in the survey of household finance , 2010, 2010 International Conference on Management Science & Engineering 17th Annual Conference Proceedings.
[2] Gregory F. Cooper,et al. A multivariate Bayesian scan statistic for early event detection and characterization , 2010, Machine Learning.
[3] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[4] Lakshminarayanan Subramanian,et al. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases , 2009, NDSS.
[5] Stephen R. Porter,et al. Non-response in student surveys: The Role of Demographics, Engagement and Personality , 2005 .
[6] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[7] Victor Shoup,et al. A computational introduction to number theory and algebra , 2005 .
[8] Martyn Denscombe,et al. Web-Based Questionnaires and the Mode Effect , 2006 .
[9] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[10] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[11] Cynthia Dwork,et al. Differential Privacy: A Survey of Results , 2008, TAMC.
[12] Stefanos Gritzalis,et al. Accurate and large-scale privacy-preserving data mining using the election paradigm , 2009, Data Knowl. Eng..
[13] J. Vaske,et al. Can Weighting Compensate for Sampling Issues in Internet Surveys? , 2011 .
[14] George T. Duncan,et al. Automatic detection of omissions in medication lists , 2011, J. Am. Medical Informatics Assoc..
[15] Radha Poovendran,et al. A framework and taxonomy for comparison of electronic voting schemes , 2006, Comput. Secur..
[16] Elaine Shi,et al. Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.
[17] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[18] Kenji Fujimoto,et al. Privacy preserving Web-based questionnaire , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[19] Rui Zhang,et al. PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.
[20] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[21] Daniel Mossé,et al. Privacy and robustness for data aggregation in wireless sensor networks , 2010, CCS '10.
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] Vipul Goyal,et al. Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.
[24] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[25] Suman Nath,et al. Differentially private aggregation of distributed time-series with transformation and encryption , 2010, SIGMOD Conference.