TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary
function on their respective private inputs while revealing no information beyond the …
function on their respective private inputs while revealing no information beyond the …
Privacy-preserving record linkage
R Hall, SE Fienberg - International conference on privacy in statistical …, 2010 - Springer
Record linkage has a long tradition in both the statistical and the computer science literature.
We survey current approaches to the record linkage problem in a privacy-aware setting and …
We survey current approaches to the record linkage problem in a privacy-aware setting and …
Efficient privacy preserving k-means clustering
This paper introduces an efficient privacy-preserving protocol for distributed K-means
clustering over an arbitrary partitioned data, shared among N parties. Clustering is one of …
clustering over an arbitrary partitioned data, shared among N parties. Clustering is one of …
Privacy-preserving clone detection for RFID-enabled supply chains
D Zanetti, L Fellmann, S Capkun - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
Counterfeit products cause financial losses and represent a health risk. Within RFID-
enabled supply chains, where products are equipped with RFID tags, clone detection …
enabled supply chains, where products are equipped with RFID tags, clone detection …
From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to (jointly) correctly compute\emph {any} function on their private input data, without …
parties to (jointly) correctly compute\emph {any} function on their private input data, without …
[PDF][PDF] Efficient Privacy Preserving Protocols for Visual Computation
M Upmanyu - 2010 - cdn.iiit.ac.in
The rapid expansion of the Internet is receiving a great deal of attention world-wide. The
technological developments and the increase in online communications have played a vital …
technological developments and the increase in online communications have played a vital …
Collusion-free privacy preserving data mining
M Rajalakshmi, T Purusothaman… - International Journal of …, 2010 - igi-global.com
Distributed association rule mining is an integral part of data mining that extracts useful
information hidden in distributed data sources. As local frequent itemsets are globalized …
information hidden in distributed data sources. As local frequent itemsets are globalized …
[PDF][PDF] Privacy Preserving Techniques for Speech Processing
M Pathak - Dec, 2010 - cs.cmu.edu
Speech is perhaps the most private form of personal communication but current speech
processing techniques are not designed to preserve the privacy of the speaker and require …
processing techniques are not designed to preserve the privacy of the speaker and require …
Proxy-secure computation model: application to k-means clustering implementation, analysis and improvements
E Pattuk - 2010 - research.sabanciuniv.edu
Distributed privacy preserving data mining applications, where data is divided among
several parties, require high amounts of network communication. In order to overcome this …
several parties, require high amounts of network communication. In order to overcome this …
[PDF][PDF] DOKTORA TEZİ
BVEGK İÇİN, II DANIŞMAN - nek.istanbul.edu.tr
A: Çapraz geçerlemede her bir katın doğruluk ölçümü An: Naive Bayes sınıflandırıcıda n
nitelikli grup üzerinde yapılan n ölçümleri c: Önerilen algoritmada kullanılan bir sayıcı d …
nitelikli grup üzerinde yapılan n ölçümleri c: Önerilen algoritmada kullanılan bir sayıcı d …