Sciweavers

59 search results - page 3 / 12
» Privacy-Preserving Protocols for Eigenvector Computation
Sort
View
PAKDD
2010
ACM
182views Data Mining» more  PAKDD 2010»
13 years 9 months ago
Computation of Ratios of Secure Summations in Multi-party Privacy-Preserving Latent Dirichlet Allocation
In this paper, we focus our attention on the problem of computing the ratio of two numbers, both of which are the summations of the private numbers distributed in different parties...
Bin Yang, Hiroshi Nakagawa
FC
2009
Springer
150views Cryptology» more  FC 2009»
13 years 12 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
SDM
2008
SIAM
177views Data Mining» more  SDM 2008»
13 years 6 months ago
Practical Private Computation and Zero-Knowledge Tools for Privacy-Preserving Distributed Data Mining
In this paper we explore private computation built on vector addition and its applications in privacypreserving data mining. Vector addition is a surprisingly general tool for imp...
Yitao Duan, John F. Canny
ICDCSW
2002
IEEE
13 years 10 months ago
A Flexible, Privacy-Preserving Authentication Framework for Ubiquitous Computing Environments
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical s...
Jalal Al-Muhtadi, Anand Ranganathan, Roy H. Campbe...
ICDM
2006
IEEE
169views Data Mining» more  ICDM 2006»
13 years 11 months ago
Privacy-Preserving Data Imputation
In this paper, we investigate privacy-preserving data imputation on distributed databases. We present a privacypreserving protocol for filling in missing values using a lazy deci...
Geetha Jagannathan, Rebecca N. Wright