You are here

Bibliography

Export 5 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is data privacy  [Clear All Filters]
2013
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
2011
Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V. "You Might Also Like:" Privacy Risks of Collaborative Filtering. In: Security and Privacy (SP), 2011 IEEE Symposium on. Security and Privacy (SP), 2011 IEEE Symposium on. ; 2011.
2009
Melchor CA, Ait-Salem B, Gaborit P. A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. In: Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. ; 2009.
2008
Wang I-C, Shen C-H, Hsu T-sheng, Liao C-C, Wang D-W, Zhan J. Towards Empirical Aspects of Secure Scalar Product. In: Information Security and Assurance, 2008. ISA 2008. International Conference on. Information Security and Assurance, 2008. ISA 2008. International Conference on. ; 2008.
2006
Shaneck M, Kim Y, Kumar V. Privacy Preserving Nearest Neighbor Search. In: Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. ; 2006.