A randomized protocol for signing contracts
Communications of the ACM
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Founding crytpography on oblivious transfer
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
The round complexity of secure protocols
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Non-interactive oblivious transfer and applications
CRYPTO '89 Proceedings on Advances in cryptology
Comparing information without leaking it
Communications of the ACM
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Computational Work and Time on Finite Machines
Journal of the ACM (JACM)
Privacy preserving auctions and mechanism design
Proceedings of the 1st ACM conference on Electronic commerce
Efficient oblivious transfer protocols
SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms
Pseudorandomness and Cryptographic Applications
Pseudorandomness and Cryptographic Applications
Tools for privacy preserving distributed data mining
ACM SIGKDD Explorations Newsletter
Randomization in privacy preserving data mining
ACM SIGKDD Explorations Newsletter
Detecting privacy and ethical sensitivity in data mining results
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Cardinality-based inference control in OLAP systems: an information theoretic approach
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Deriving private information from randomized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
To do or not to do: the dilemma of disclosing anonymized data
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
A privacy-sensitive approach to distributed clustering
Pattern Recognition Letters - Special issue: Advances in pattern recognition
IEEE Transactions on Knowledge and Data Engineering
Privacy preserving sequential pattern mining in distributed databases
CIKM '06 Proceedings of the 15th ACM international conference on Information and knowledge management
Safely delegating data mining tasks
AusDM '06 Proceedings of the fifth Australasian conference on Data mining and analystics - Volume 61
Privacy preserving decision tree learning over multiple parties
Data & Knowledge Engineering
Privacy preserving data mining of sequential patterns for network traffic data
Information Sciences: an International Journal
Preserving privacy in association rule mining with bloom filters
Journal of Intelligent Information Systems
Oblivious neural network computing via homomorphic encryption
EURASIP Journal on Information Security
A unified framework for protecting sensitive association rules in business collaboration
International Journal of Business Intelligence and Data Mining
Anonymity preserving pattern discovery
The VLDB Journal — The International Journal on Very Large Data Bases
A privacy preserving technique for distance-based classification with worst case privacy guarantees
Data & Knowledge Engineering
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Improved Garbled Circuit: Free XOR Gates and Applications
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Financial Cryptography and Data Security
Protecting business intelligence and customer privacy while outsourcing data mining tasks
Knowledge and Information Systems
Information Security and Cryptology --- ICISC 2008
GATEway: symbiotic inter-domain traffic engineering
Proceedings of the 3rd International Conference on Performance Evaluation Methodologies and Tools
International Journal of Data Analysis Techniques and Strategies
A Secure Protocol to Maintain Data Privacy in Data Mining
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Accurate and large-scale privacy-preserving data mining using the election paradigm
Data & Knowledge Engineering
A novel approach for privacy mining of generic basic association rules
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Differential privacy with compression
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
Distributed data mining and agents
Engineering Applications of Artificial Intelligence
Inference in distributed data clustering
Engineering Applications of Artificial Intelligence
Privacy-preserving data publishing: A survey of recent developments
ACM Computing Surveys (CSUR)
A cryptography based privacy preserving solution to mine cloud data
Proceedings of the Third Annual ACM Bangalore Conference
Privacy-preserving discovery of frequent patterns in time series
ICDM'07 Proceedings of the 7th industrial conference on Advances in data mining: theoretical aspects and applications
Composite signal representation for fast and storage-efficient processing of encrypted signals
IEEE Transactions on Information Forensics and Security
A secure multiparty computation privacy preserving OLAP framework over distributed XML data
Proceedings of the 2010 ACM Symposium on Applied Computing
Privacy preserving data mining of sequential patterns for network traffic data
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Privacy-preserving data mining through knowledge model sharing
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
PinKDD'07 Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD
Secure function evaluation based on secret sharing and homomorphic encryption
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Secure evaluation of private linear branching programs with medical applications
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
APHID: An architecture for private, high-performance integrated data mining
Future Generation Computer Systems
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Privacy-aware regression modeling of participatory sensing data
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Secure top-k subgroup discovery
PSDML'10 Proceedings of the international ECML/PKDD conference on Privacy and security issues in data mining and machine learning
Journal of Computer and System Sciences
Anonymity meets game theory: secure data integration with malicious participants
The VLDB Journal — The International Journal on Very Large Data Bases
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
On robust and effective k-anonymity in large databases
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
More on shared-scalar-product protocols
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Inference on distributed data clustering
MLDM'05 Proceedings of the 4th international conference on Machine Learning and Data Mining in Pattern Recognition
Privacy preserving naive bayes classification
ADMA'05 Proceedings of the First international conference on Advanced Data Mining and Applications
On private scalar product computation for privacy-preserving data mining
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Collusion-Resistant protocol for privacy-preserving distributed association rules mining
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Forecasting using rules extracted from privacy preservation neural network
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
A graph enrichment based clustering over vertically partitioned data
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
Secure Distributed Subgroup Discovery in Horizontally Partitioned Data
Transactions on Data Privacy
Towards a theory for privacy preserving distributed OLAP
Proceedings of the 2012 Joint EDBT/ICDT Workshops
Approximate privacy-preserving data mining on vertically partitioned data
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Private client-side profiling with random forests and hidden markov models
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Fuzzy based privacy preserving classification of data streams
Proceedings of the CUBE International Information Technology Conference
Foundations of garbled circuits
Proceedings of the 2012 ACM conference on Computer and communications security
DJoin: differentially private join queries over distributed databases
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Enhancing the efficiency in privacy preserving learning of decision trees in partitioned databases
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
A Knowledge Model Sharing Based Approach to Privacy-Preserving Data Mining
Transactions on Data Privacy
Specialization in i* strategic rationale diagrams
ER'12 Proceedings of the 31st international conference on Conceptual Modeling
Application and analysis of multidimensional negative surveys in participatory sensing applications
Pervasive and Mobile Computing
Hi-index | 0.00 |
Research in secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved remarkable results. It was shown that non-trusting parties can jointly compute functions of their different inputs while ensuring that no party learns anything but the defined output of the function. These results were shown using generic constructions that can be applied to any function that has an efficient representation as a circuit. We describe these results, discuss their efficiency, and demonstrate their relevance to privacy preserving computation of data mining algorithms. We also show examples of secure computation of data mining algorithms that use these generic constructions.