Item-Based Privacy-Preserving Recommender System with Offline Users and Reduced Trust Requirements
暂无分享,去创建一个
[1] Oded Goldreich,et al. Foundations of Cryptography - A Primer , 2005, Found. Trends Theor. Comput. Sci..
[2] Kristina Lerman,et al. Social Networks and Social Information Filtering on Digg , 2006, ICWSM.
[3] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[4] Kim-Kwang Raymond Choo,et al. Privacy-aware smart city: A case study in collaborative filtering recommender systems , 2018, J. Parallel Distributed Comput..
[5] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[6] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[7] Ilya Mironov,et al. Differentially private recommender systems: building privacy into the net , 2009, KDD.
[8] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[9] Vinod Vaikuntanathan,et al. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.
[10] Ibrahim Khalil,et al. A Practical Privacy-Preserving Recommender System , 2016, Data Science and Engineering.
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] John Riedl,et al. GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.
[13] Georg Groh,et al. Recommendations in taste related domains: collaborative filtering vs. social filtering , 2007, GROUP.
[14] Adrianus Johannus Paulus Jeckmans. Cryptographically-Enhanced Privacy for Recommender Systems , 2014 .
[15] Elisa Bertino,et al. Privacy Preserving User-Based Recommender System , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[16] Yvo Desmedt,et al. A secure and scalable Group Key Exchange system , 2005, Inf. Process. Lett..
[17] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[18] Rashmi R. Sinha,et al. Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.
[19] Zekeriya Erkin,et al. Efficiently computing private recommendations , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[20] Ido Guy,et al. Personalized recommendation of social software items based on social relations , 2009, RecSys '09.
[21] Amit Sahai,et al. Secure Multi-Party Computation , 2013 .
[22] Huseyin Polat,et al. Arbitrarily distributed data-based recommendations with privacy , 2012, Data Knowl. Eng..
[23] Zekeriya Erkin,et al. Generating Private Recommendations Efficiently Using Homomorphic Encryption and Data Packing , 2012, IEEE Transactions on Information Forensics and Security.
[24] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[25] Dan Boneh,et al. Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.