-PPI: Searching Information Networks with Quantitative Privacy Guarantee
暂无分享,去创建一个
Ling Liu | Yuzhe Tang | Arun Iyengar | Ling Liu | A. Iyengar | Y. Tang
[1] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[2] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[3] Shicong Meng,et al. Privacy preserving indexing for eHealth information networks , 2011, CIKM '11.
[4] Ming Li,et al. Authorized Private Keyword Search over Encrypted Data in Cloud Computing , 2011, 2011 31st International Conference on Distributed Computing Systems.
[5] Andreas Haeberlen,et al. DJoin: differentially private join queries over distributed databases , 2012, OSDI 2012.
[6] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[7] Benny Pinkas,et al. FairplayMP: a system for secure multi-party computation , 2008, CCS.
[8] Marianne Winslett,et al. Zerber: r-confidential indexing for distributed documents , 2008, EDBT '08.
[9] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[10] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[11] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[12] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[13] David Hawking,et al. Overview of the TREC-9 Web Track , 2000, TREC.
[14] Mike Hibler,et al. An integrated experimental environment for distributed systems and networks , 2002, OPSR.
[15] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..
[16] Roberto J. Bayardo,et al. Make it fresh, make it quick: searching a network of personal webservers , 2003, WWW '03.
[17] Jaideep Vaidya,et al. Privacy-preserving indexing of documents on the network , 2003, The VLDB Journal.
[18] Cong Wang,et al. Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.
[19] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[20] Cong Wang,et al. Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .
[21] Jie Lu,et al. Content-based retrieval in hybrid peer-to-peer networks , 2003, CIKM '03.