Privacy-preserving ECG classification with branching programs and neural networks
Privacy protection is a crucial problem in many biomedical signal processing applications.
For this reason, particular attention has been given to the use of secure multiparty …
For this reason, particular attention has been given to the use of secure multiparty …
[PDF][PDF] Secure multiple linear regression based on homomorphic encryption
We consider the problem of linear regression where the data are split up and held by
different parties. We conceptualize the existence of a single combined database containing …
different parties. We conceptualize the existence of a single combined database containing …
Distributed data mining with differential privacy
With recent advances in communication and data storage technology, an explosive amount
of information is being collected and stored in the Internet. Even though such vast amount of …
of information is being collected and stored in the Internet. Even though such vast amount of …
Vmcrypt: modular software architecture for scalable secure computation
L Malka - Proceedings of the 18th ACM conference on Computer …, 2011 - dl.acm.org
Garbled circuit play a key role in secure computation, but existing implementations do not
scale and are not modular. In this paper we present VMCrypt, a library for secure …
scale and are not modular. In this paper we present VMCrypt, a library for secure …
Service-oriented architecture for high-dimensional private data mashup
Mashup is a web technology that allows different service providers to flexibly integrate their
expertise and to deliver highly customizable services to their customers. Data mashup is a …
expertise and to deliver highly customizable services to their customers. Data mashup is a …
Sign modules in secure arithmetic circuits
CH Yu - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Abstract In 1994, Feige, Killian, and Naor suggested a toy protocol of secure comparison,
which takes secret input $[x] _7 $ and $[y] _7 $ between 0 and 2, using the modulo 7 …
which takes secret input $[x] _7 $ and $[y] _7 $ between 0 and 2, using the modulo 7 …
[PDF][PDF] 面向移动终端的微博信息推荐方法
宋双永, 李秋丹 - 2011 - researchgate.net
摘要微型博客(简称“微博”) 以其简洁方便的交互方式, 受到越来越多手机用户的喜爱. 然而,
微博数据量大, 更新速度快以及手机屏幕小, 登录网络服务速度较慢等原因 …
微博数据量大, 更新速度快以及手机屏幕小, 登录网络服务速度较慢等原因 …
Privacy-preserving data mining
Y Yin, I Kaku, J Tang, JM Zhu, Y Yin, I Kaku… - Data Mining: Concepts …, 2011 - Springer
Privacy-preserving data mining (PPDM) is one of the newest trends in privacy and security
research. It is driven by one of the major policy issues of the information era: the right to …
research. It is driven by one of the major policy issues of the information era: the right to …
[图书][B] Enabling collaborative network security with privacy-preserving data aggregation
M Burkhart - 2011 - research-collection.ethz.ch
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and
more globally and coordinated, eg, by using botnets, their counterparts trying to manage and …
more globally and coordinated, eg, by using botnets, their counterparts trying to manage and …
Efficient secure two-party exponentiation
We present a new framework to design secure two-party computation protocols for
exponentiation over integers and over ZQ where Q is a publicly-known prime. Using our …
exponentiation over integers and over ZQ where Q is a publicly-known prime. Using our …