On Privacy Protection in Distributed Information Sharing
暂无分享,去创建一个
[1] Henryk Wozniakowski,et al. The statistical security of a statistical database , 1984, TODS.
[2] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[3] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[4] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[5] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[6] Salvatore J. Stolfo,et al. Privacy-preserving payload-based correlation for accurate malicious traffic detection , 2006, LSAD '06.
[7] Manuel Blum. How to exchange (secret) keys , 1983, STOC '83.
[8] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[9] Jaideep Vaidya,et al. Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data , 2003 .
[10] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[11] Chris Clifton,et al. Privacy-Preserving Distributed k-Anonymity , 2005, DBSec.
[12] Sheng Zhong,et al. Anonymity-preserving data collection , 2005, KDD '05.
[13] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[14] Wei Zhao,et al. On the confidential auditing of distributed computing systems , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[15] D. Song,et al. Private and threshold set-intersection , 2004 .