A taxonomy of privacy-preserving record linkage techniques
The process of identifying which records in two or more databases correspond to the same
entity is an important aspect of data quality activities such as data pre-processing and data …
entity is an important aspect of data quality activities such as data pre-processing and data …
A multi-site resting state fMRI study on the amplitude of low frequency fluctuations in schizophrenia
Background: This multi-site study compares resting state fMRI amplitude of low frequency
fluctuations (ALFF) and fractional ALFF (fALFF) between patients with schizophrenia (SZ) …
fluctuations (ALFF) and fractional ALFF (fALFF) between patients with schizophrenia (SZ) …
Outsourcing large matrix inversion computation to a public cloud
Cloud computing enables resource-constrained clients to economically outsource their huge
computation workloads to a cloud server with massive computational power. This promising …
computation workloads to a cloud server with massive computational power. This promising …
Privacy technology to support data sharing for comparative effectiveness research: a systematic review
Objective: Effective data sharing is critical for comparative effectiveness research (CER), but
there are significant concerns about inappropriate disclosure of patient data. These …
there are significant concerns about inappropriate disclosure of patient data. These …
Secure multiparty aggregation with differential privacy: A comparative study
S Goryczka, L Xiong, V Sunderam - Proceedings of the Joint EDBT/ICDT …, 2013 - dl.acm.org
This paper considers the problem of secure data aggregation in a distributed setting while
preserving differential privacy for the aggregated data. In particular, we focus on the secure …
preserving differential privacy for the aggregated data. In particular, we focus on the secure …
-Privacy for Collaborative Data Publishing
In this paper, we consider the collaborative data publishing problem for anonymizing
horizontally partitioned data at multiple data providers. We consider a new type of “insider …
horizontally partitioned data at multiple data providers. We consider a new type of “insider …
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design
V Kolesnikov, AR Sadeghi… - Journal of Computer …, 2013 - content.iospress.com
Abstract General two-party Secure Function Evaluation (SFE) allows mutually distrusting
parties to correctly compute any function on their private input data, without revealing the …
parties to correctly compute any function on their private input data, without revealing the …
Privacy-preserving data mining techniques: survey and challenges
S Matwin - Discrimination and privacy in the information society …, 2013 - Springer
This chapter presents a brief summary and review of Privacy-preserving Data Mining
(PPDM). The review of the existing approaches is structured along a tentative taxonomy of …
(PPDM). The review of the existing approaches is structured along a tentative taxonomy of …
Faster secure two-party computation with less memory
W Henecka, T Schneider - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Secure two-party computation is used as the basis for a large variety of privacy-preserving
protocols, but often concerns about the low performance hinder the move away from non …
protocols, but often concerns about the low performance hinder the move away from non …
Private proximity detection for convex polygons
B Mu, S Bakiras - Proceedings of the 12th International ACM Workshop …, 2013 - dl.acm.org
Proximity detection is an emerging technology in Geo-Social Networks that notifies mobile
users when they are in proximity. Nevertheless, users may be unwilling to participate in such …
users when they are in proximity. Nevertheless, users may be unwilling to participate in such …