Secure Similar Document Detection with Simhash
暂无分享,去创建一个
[1] Wei Jiang,et al. N-Gram Based Secure Similar Document Detection , 2011, DBSec.
[2] Gurmeet Singh Manku,et al. Detecting near-duplicates for web crawling , 2007, WWW '07.
[3] Emiliano De Cristofaro,et al. Fast and Private Computation of Set Intersection Cardinality , 2011, IACR Cryptol. ePrint Arch..
[4] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[5] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[6] Lei Wang,et al. Achieving both high precision and high recall in near-duplicate detection , 2008, CIKM '08.
[7] Chris Clifton,et al. Efficient privacy-preserving similar document detection , 2010, The VLDB Journal.
[8] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[9] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[10] Moni Naor,et al. Computationally Secure Oblivious Transfer , 2004, Journal of Cryptology.
[11] Chris Clifton,et al. Similar Document Detection with Limited Information Disclosure , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[12] Udi Manber,et al. Finding Similar Files in a Large File System , 1994, USENIX Winter.
[13] Emiliano De Cristofaro,et al. EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity , 2012, DPM/SETOP.
[14] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..