Privacy-preserving ECG classification with branching programs and neural networks

M Barni, P Failla, R Lazzeretti… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
Privacy protection is a crucial problem in many biomedical signal processing applications.
For this reason, particular attention has been given to the use of secure multiparty …

[PDF][PDF] Secure multiple linear regression based on homomorphic encryption

R Hall, SE Fienberg, Y Nardi - Journal of official statistics, 2011 - scb.se
We consider the problem of linear regression where the data are split up and held by
different parties. We conceptualize the existence of a single combined database containing …

Distributed data mining with differential privacy

N Zhang, M Li, W Lou - 2011 IEEE international conference on …, 2011 - ieeexplore.ieee.org
With recent advances in communication and data storage technology, an explosive amount
of information is being collected and stored in the Internet. Even though such vast amount of …

Vmcrypt: modular software architecture for scalable secure computation

L Malka - Proceedings of the 18th ACM conference on Computer …, 2011 - dl.acm.org
Garbled circuit play a key role in secure computation, but existing implementations do not
scale and are not modular. In this paper we present VMCrypt, a library for secure …

Service-oriented architecture for high-dimensional private data mashup

BCM Fung, T Trojer, PCK Hung, L Xiong… - IEEE Transactions …, 2011 - ieeexplore.ieee.org
Mashup is a web technology that allows different service providers to flexibly integrate their
expertise and to deliver highly customizable services to their customers. Data mashup is a …

Sign modules in secure arithmetic circuits

CH Yu - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Abstract In 1994, Feige, Killian, and Naor suggested a toy protocol of secure comparison,
which takes secret input $[x] _7 $ and $[y] _7 $ between 0 and 2, using the modulo 7 …

[PDF][PDF] 面向移动终端的微博信息推荐方法

宋双永, 李秋丹 - 2011 - researchgate.net
摘要微型博客(简称“微博”) 以其简洁方便的交互方式, 受到越来越多手机用户的喜爱. 然而,
微博数据量大, 更新速度快以及手机屏幕小, 登录网络服务速度较慢等原因 …

Privacy-preserving data mining

Y Yin, I Kaku, J Tang, JM Zhu, Y Yin, I Kaku… - Data Mining: Concepts …, 2011 - Springer
Privacy-preserving data mining (PPDM) is one of the newest trends in privacy and security
research. It is driven by one of the major policy issues of the information era: the right to …

[图书][B] Enabling collaborative network security with privacy-preserving data aggregation

M Burkhart - 2011 - research-collection.ethz.ch
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and
more globally and coordinated, eg, by using botnets, their counterparts trying to manage and …

Efficient secure two-party exponentiation

CH Yu, SSM Chow, KM Chung, FH Liu - … in Cryptology–CT-RSA 2011: The …, 2011 - Springer
We present a new framework to design secure two-party computation protocols for
exponentiation over integers and over ZQ where Q is a publicly-known prime. Using our …