Privacy of outsourced two‐party k‐means clustering

[1]  Jaideep Vaidya,et al.  Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[4]  Chris Clifton,et al.  Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.

[5]  Jonathan Katz,et al.  Introduction to Modern Cryptography: Principles and Protocols , 2007 .

[6]  Rebecca N. Wright,et al.  Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.

[7]  Vinod Vaikuntanathan,et al.  Can homomorphic encryption be practical? , 2011, CCSW '11.

[8]  Jin Tong,et al.  US Government Cloud Computing Technology Roadmap , 2014 .

[9]  Somesh Jha,et al.  Privacy Preserving Clustering , 2005, ESORICS.

[10]  Dongxi Liu,et al.  Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[11]  Chris Clifton,et al.  Privacy-preserving decision trees over vertically partitioned data , 2005, TKDD.

[12]  Fred Douglis World Wide Web Characterization and Performance Evaluation - Preface , 1999, World Wide Web.

[13]  Yanchun Zhang,et al.  Equally contributory privacy-preserving k-means clustering over vertically partitioned data , 2013, Inf. Syst..

[14]  S. P. Lloyd,et al.  Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.

[15]  Dongxi Liu,et al.  Privacy of outsourced k-means clustering , 2014, AsiaCCS.

[16]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[17]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[18]  Zhe Xia,et al.  Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.

[19]  Wei Jiang,et al.  Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.

[20]  Keng-Pei Lin Privacy-preserving kernel k-means clustering outsourcing with random transformation , 2016, Knowledge and Information Systems.

[21]  Rafail Ostrovsky,et al.  Secure two-party k-means clustering , 2007, CCS '07.

[22]  Yehuda Lindell,et al.  An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.

[23]  Zoe L. Jiang,et al.  Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).

[24]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[25]  Dongxi Liu,et al.  Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).