Sciweavers

108 search results - page 16 / 22
» Differential privacy in data publication and analysis
Sort
View
FC
2010
Springer
196views Cryptology» more  FC 2010»
15 years 3 months ago
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis
Abstract. For the homomorphic Paillier cryptosystem we construct a protocol for secure modulo reduction, that on input of an encryption x with x of bit length x and a public ‘mod...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
BMCBI
2008
96views more  BMCBI 2008»
14 years 11 months ago
Use of normalization methods for analysis of microarrays containing a high degree of gene effects
Background: High-throughput microarrays are widely used to study gene expression across tissues and developmental stages. Analysis of gene expression data is challenging in these ...
Terri T. Ni, William J. Lemon, Yu Shyr, Tao P. Zho...
VLDB
2005
ACM
136views Database» more  VLDB 2005»
15 years 5 months ago
On k-Anonymity and the Curse of Dimensionality
In recent years, the wide availability of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed fo...
Charu C. Aggarwal
BMCBI
2005
157views more  BMCBI 2005»
14 years 11 months ago
Statistical Viewer: a tool to upload and integrate linkage and association data as plots displayed within the Ensembl genome bro
Background: To facilitate efficient selection and the prioritization of candidate complex disease susceptibility genes for association analysis, increasingly comprehensive annotat...
Judith E. Stenger, Hong Xu, Carol Haynes, Elizabet...
ACSAC
2010
IEEE
14 years 3 months ago
A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan
We present a quantitative lower bound on the number of vulnerable embedded device on a global scale. Over the past year, we have systematically scanned large portions of the inter...
Ang Cui, Salvatore J. Stolfo