Oblivious {Multi-Party} machine learning on trusted processors

O Ohrimenko, F Schuster, C Fournet, A Mehta… - 25th USENIX Security …, 2016 - usenix.org
Privacy-preserving multi-party machine learning allows multiple organizations to perform
collaborative data analytics while guaranteeing the privacy of their individual datasets …

[图书][B] Methodological developments in data linkage

K Harron, H Goldstein, C Dibben - 2016 - Wiley Online Library
The increasing availability of large administrative databases for research has led to a
dramatic rise in the use of data linkage. The speed and accuracy of linkage have much …

Meeting points in ridesharing: A privacy-preserving approach

UM Aïvodji, S Gambs, MJ Huguet… - … Research Part C …, 2016 - Elsevier
Nowadays, problems of congestion in urban areas due to the massive usage of cars, last-
minute travel needs and progress in information and communication technologies have …

Outsourcing eigen-decomposition and singular value decomposition of large matrix to a public cloud

L Zhou, C Li - IEEE Access, 2016 - ieeexplore.ieee.org
Cloud computing enables customers with limited computational resources to outsource their
huge computation workloads to the cloud with massive computational power. However, in …

Efficient and privacy-preserving k-means clustering for big data mining

Z Gheid, Y Challal - 2016 IEEE Trustcom/BigDataSE/ISPA, 2016 - ieeexplore.ieee.org
Recent advances in sensing and storing technologies have led to big data age where a
huge amount of data are distributed across sites to be stored and analysed. Indeed, cluster …

Location-enhanced authentication using the IoT: Because you cannot be in two places at once

I Agadakos, P Hallgren, D Damopoulos… - Proceedings of the …, 2016 - dl.acm.org
User location can act as an additional factor of authentication in scenarios where physical
presence is required, such as when making in-person purchases or unlocking a vehicle …

A survey of homomorphic encryption for outsourced big data computation

TS Fun, A Samsudin - KSII Transactions on Internet and Information …, 2016 - koreascience.kr
With traditional data storage solutions becoming too expensive and cumbersome to support
Big Data processing, enterprises are now starting to outsource their data requirements to …

Scalable privacy-preserving linking of multiple databases using counting Bloom filters

D Vatsalan, P Christen, E Rahm - 2016 IEEE 16th International …, 2016 - ieeexplore.ieee.org
The integration, mining, and analysis of person-specific data can provide enormous
opportunities for organizations, governments, and researchers to leverage today's massive …

CQSTR: Securing cross-tenant applications with cloud containers

Y Zhai, L Yin, J Chase, T Ristenpart… - Proceedings of the Seventh …, 2016 - dl.acm.org
Cloud providers are in a position to greatly improve the trust clients have in network
services: IaaS platforms can isolate services so they cannot leak data, and can help verify …

-SAS: Privacy-Preserving Centralized Dynamic Spectrum Access System

Y Dou, K Zeng, H Li, Y Yang, B Gao… - IEEE Journal on …, 2016 - ieeexplore.ieee.org
Centralized spectrum management is one of the key dynamic spectrum access (DSA)
mechanisms proposed to govern the spectrum sharing between government incumbent …