TASTY: tool for automating secure two-party computations

W Henecka, SK ögl, AR Sadeghi, T Schneider… - Proceedings of the 17th …, 2010 - dl.acm.org
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary
function on their respective private inputs while revealing no information beyond the …

Privacy-preserving record linkage

R Hall, SE Fienberg - International conference on privacy in statistical …, 2010 - Springer
Record linkage has a long tradition in both the statistical and the computer science literature.
We survey current approaches to the record linkage problem in a privacy-aware setting and …

Efficient privacy preserving k-means clustering

M Upmanyu, AM Namboodiri, K Srinathan… - Intelligence and Security …, 2010 - Springer
This paper introduces an efficient privacy-preserving protocol for distributed K-means
clustering over an arbitrary partitioned data, shared among N parties. Clustering is one of …

Privacy-preserving clone detection for RFID-enabled supply chains

D Zanetti, L Fellmann, S Capkun - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Counterfeit products cause financial losses and represent a health risk. Within RFID-
enabled supply chains, where products are equipped with RFID tags, clone detection …

From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design

V Kolesnikov, AR Sadeghi, T Schneider - Cryptology ePrint Archive, 2010 - eprint.iacr.org
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to (jointly) correctly compute\emph {any} function on their private input data, without …

[PDF][PDF] Efficient Privacy Preserving Protocols for Visual Computation

M Upmanyu - 2010 - cdn.iiit.ac.in
The rapid expansion of the Internet is receiving a great deal of attention world-wide. The
technological developments and the increase in online communications have played a vital …

Collusion-free privacy preserving data mining

M Rajalakshmi, T Purusothaman… - International Journal of …, 2010 - igi-global.com
Distributed association rule mining is an integral part of data mining that extracts useful
information hidden in distributed data sources. As local frequent itemsets are globalized …

[PDF][PDF] Privacy Preserving Techniques for Speech Processing

M Pathak - Dec, 2010 - cs.cmu.edu
Speech is perhaps the most private form of personal communication but current speech
processing techniques are not designed to preserve the privacy of the speaker and require …

Proxy-secure computation model: application to k-means clustering implementation, analysis and improvements

E Pattuk - 2010 - research.sabanciuniv.edu
Distributed privacy preserving data mining applications, where data is divided among
several parties, require high amounts of network communication. In order to overcome this …

[PDF][PDF] DOKTORA TEZİ

BVEGK İÇİN, II DANIŞMAN - nek.istanbul.edu.tr
A: Çapraz geçerlemede her bir katın doğruluk ölçümü An: Naive Bayes sınıflandırıcıda n
nitelikli grup üzerinde yapılan n ölçümleri c: Önerilen algoritmada kullanılan bir sayıcı d …