Recommendation in the end-to-end encrypted domain
暂无分享,去创建一个
[1] B. Barak. Fully Homomorphic Encryption and Post Quantum Cryptography , 2010 .
[2] Licia Capra,et al. Private distributed collaborative filtering using estimated concordance measures , 2007, RecSys '07.
[3] Daniele Micciancio. Lattice-Based Cryptography , 2011, Encyclopedia of Cryptography and Security.
[4] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[5] Elaine B. Barker,et al. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography , 2007 .
[6] Bradley N. Miller,et al. PocketLens: Toward a personal recommender system , 2004, TOIS.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Tsvi Kuflik,et al. Enhancing privacy and preserving accuracy of a distributed collaborative filtering , 2007, RecSys '07.
[10] Volker Tresp,et al. Soft Clustering on Graphs , 2005, NIPS.
[11] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[12] Craig Gentry,et al. Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.
[13] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[14] Edwin R. Hancock,et al. Structural Graph Matching Using the EM Algorithm and Singular Value Decomposition , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[16] Wenliang Du,et al. Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data , 2005, PKDD.
[17] John F. Canny,et al. Collaborative filtering with privacy via factor analysis , 2002, SIGIR '02.
[18] Wenliang Du,et al. Achieving Private Recommendations Using Randomized Response Techniques , 2006, PAKDD.