TY - BOOK AU - Jesdanun, A. PY - 2007 DA - 2007// TI - Youtube, Vacom Agree to Mask Viewer Data ID - Jesdanun2007 ER - TY - CHAP AU - Hassan, W. AU - Logrippo, L. ED - Amyot, D. ED - Logrippo, L. PY - 2005 DA - 2005// TI - Governance policies for privacy access control and their interactions BT - Feature Interactions in Telecommunication and Software Systems VIII ID - Hassan2005 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - -anonymity: a model for protecting privacy JO - International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER - TY - JOUR AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. PY - 2001 DA - 2001// TI - Enhancing security and privacy in biometrics-based authentication systems JO - IBM Systems Journal VL - 40 UR - https://doi.org/10.1147/sj.403.0614 DO - 10.1147/sj.403.0614 ID - Ratha2001 ER - TY - JOUR AU - Hoque, S. AU - Fairhurst, M. AU - Howells, G. AU - Deravi, F. PY - 2005 DA - 2005// TI - Feasibility of generating biometric encryption keys JO - Electronics Letters VL - 41 UR - https://doi.org/10.1049/el:20057524 DO - 10.1049/el:20057524 ID - Hoque2005 ER - TY - CHAP AU - Uludag, U. AU - Jain, A. PY - 2006 DA - 2006// TI - Securing fingerprint template: fuzzy vault with helper data BT - Proceedings of the Computer Vision and Pattern Recognition Workshops (CVPR '06) ID - Uludag2006 ER - TY - JOUR AU - Newton, E. M. AU - Sweeney, L. AU - Malin, B. PY - 2005 DA - 2005// TI - Preserving privacy by de-identifying face images JO - IEEE Transactions on Knowledge and Data Engineering VL - 17 UR - https://doi.org/10.1109/TKDE.2005.32 DO - 10.1109/TKDE.2005.32 ID - Newton2005 ER - TY - CHAP AU - Ciriani, V. AU - di Vimercati, S. D. C. AU - Foresti, S. AU - Samarati, P. PY - 2007 DA - 2007// TI - -anonymity BT - Secure Data Management in Decentralized Systems PB - Springer CY - New York, NY, USA UR - https://doi.org/10.1007/978-0-387-27696-0_10 DO - 10.1007/978-0-387-27696-0_10 ID - Ciriani2007 ER - TY - BOOK AU - Goldreich, O. PY - 2004 DA - 2004// TI - Foundations of Cryptography: Volume II Basic Applications PB - Cambridge University Press CY - Cambridge, UK UR - https://doi.org/10.1017/CBO9780511721656 DO - 10.1017/CBO9780511721656 ID - Goldreich2004 ER - TY - JOUR AU - Goethals, B. AU - Laur, S. AU - Lipmaa, H. AU - Mielikäinen, T. PY - 2005 DA - 2005// TI - On private scalar product computation for privacy-preserving data mining JO - Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC '04) VL - 3506 ID - Goethals2005 ER - TY - JOUR AU - Naor, M. AU - Pinkas, B. PY - 2006 DA - 2006// TI - Oblivious polynomial evaluation JO - SIAM Journal on Computing VL - 35 UR - https://doi.org/10.1137/S0097539704383633 DO - 10.1137/S0097539704383633 ID - Naor2006 ER - TY - JOUR AU - Chang, Y. -. C. AU - Lu, C. -. J. PY - 2005 DA - 2005// TI - Oblivious polynomial evaluation and oblivious neural learning JO - Theoretical Computer Science VL - 341 UR - https://doi.org/10.1016/j.tcs.2005.03.049 DO - 10.1016/j.tcs.2005.03.049 ID - Chang2005 ER - TY - CHAP AU - Naor, M. AU - Pinkas, B. PY - 1999 DA - 1999// TI - Oblivious transfer and polynomial evaluation BT - Proceedings of the 31st Annual ACM Symposium on Theory of Computing (STOC '99) UR - https://doi.org/10.1145/301250.301312 DO - 10.1145/301250.301312 ID - Naor1999 ER - TY - JOUR AU - Damgard, I. AU - Geisler, M. AU - Kroigard, M. PY - 2008 DA - 2008// TI - Homomorphic encryption and secure comparison JO - International Journal of Applied Cryptography VL - 1 UR - https://doi.org/10.1504/IJACT.2008.017048 DO - 10.1504/IJACT.2008.017048 ID - Damgard2008 ER - TY - JOUR AU - Fischlin, M. PY - 2001 DA - 2001// TI - A cost-effective pay-per-multiplication comparison method for millionaires JO - Proceedings of the Conference on Topics in Cryptology: The Cryptographer's Track at RSA (CT-RSA '2001) VL - 2020 ID - Fischlin2001 ER - TY - CHAP AU - Yao, A. C. PY - 1982 DA - 1982// TI - Protocols for secure computations BT - Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (FOCS '82) ID - Yao1982 ER - TY - JOUR AU - Aggarwal, G. AU - Mishra, N. AU - Pinkas, B. PY - 2004 DA - 2004// TI - Secure computation of the -ranked element JO - Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '04) VL - 3027 ID - Aggarwal2004 ER - TY - JOUR AU - Kiltz, E. AU - Mohassel, P. AU - Weinreb, E. AU - Franklin, M. PY - 2007 DA - 2007// TI - Secure linear algebra using linearly recurrent sequences JO - Proceedings of the 4th Theory of Cryptography Conference (TCC '07) VL - 4392 UR - https://doi.org/10.1007/978-3-540-70936-7_16 DO - 10.1007/978-3-540-70936-7_16 ID - Kiltz2007 ER - TY - CHAP AU - Cramer, R. AU - Damgaard, I. PY - 2001 DA - 2001// TI - Secure distributed linear algebra in constant number of rounds BT - Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (IACR CRYPTO '01) ID - Cramer2001 ER - TY - JOUR AU - Schoenmakers, B. AU - Tuyls, P. PY - 2006 DA - 2006// TI - Efficient binary conversion for Paillier encrypted values JO - Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '06), May- VL - 4004 ID - Schoenmakers2006 ER - TY - CHAP AU - Jagannathan, G. AU - Pillaipakkamnatt, K. AU - Wright, R. N. PY - 2006 DA - 2006// TI - A new privacy-preserving distributed -clustering algorithm BT - Proceedings of the 6th SIAM International Conference on Data Mining (SDM '06) ID - Jagannathan2006 ER - TY - JOUR AU - Doganay, M. C. AU - Pedersen, T. B. AU - Saygin, Y. AU - Savaş, E. AU - Levi, A. PY - 2008 DA - 2008// TI - Distributed privacy preserving -means clustering with additive secret sharing JO - Proceedings of the International Workshop on Privacy and Anonymity in Information Society (PAIS '08) VL - 331 ID - Doganay2008 ER - TY - CHAP AU - Samet, S. AU - Miri, A. PY - 2008 DA - 2008// TI - Privacy preserving ID3 using gini index over horizontally partitioned data BT - Proceedings of the 6th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA '08), March- ID - Samet2008 ER - TY - CHAP AU - Zhan, J. PY - 2007 DA - 2007// TI - Privacy-preserving decision tree classification in horizontal collaboration BT - Proceedings of the 1st International Conference on Security of Information and Networks (Sin '07) ID - Zhan2007 ER - TY - JOUR AU - Lindell, Y. AU - Pinkas, B. PY - 2002 DA - 2002// TI - Privacy preserving data mining JO - Journal of Cryptology VL - 15 UR - https://doi.org/10.1007/s00145-001-0019-2 DO - 10.1007/s00145-001-0019-2 ID - Lindell2002 ER - TY - JOUR AU - Vaidya, J. AU - Yu, H. AU - Jiang, X. PY - 2008 DA - 2008// TI - Privacy-preserving SVM classification JO - Knowledge and Information Systems VL - 14 UR - https://doi.org/10.1007/s10115-007-0073-7 DO - 10.1007/s10115-007-0073-7 ID - Vaidya2008 ER - TY - CHAP AU - Orlandi, C. AU - Piva, A. AU - Barni, M. PY - 2007 DA - 2007// TI - Oblivious neural network computing via homomorphic encryption BT - EURASIP Journal on Information Security ID - Orlandi2007 ER - TY - CHAP AU - Wright, R. AU - Yang, Z. PY - 2004 DA - 2004// TI - Privacy-preserving Bayesian network structure computation on distributed heterogeneous data BT - Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '04) ID - Wright2004 ER - TY - CHAP AU - Cheung, S. -. C. AU - Nguyen, T. PY - 2007 DA - 2007// TI - Secure signal processing between distrusted network terminals BT - EURASIP Journal on Information Security ID - Cheung2007 ER - TY - CHAP AU - Rabin, M. O. PY - 1981 DA - 1981// BT - How to exchange secrets by oblivious transfer ID - Rabin1981 ER - TY - CHAP AU - Boneh, D. AU - Goh, E. -. J. AU - Nissim, K. ED - Killian, J. PY - 2005 DA - 2005// TI - Evaluating 2-DNF formulas on ciphertexts BT - Proceedings of the Theory of Cryptography Conference (TCC '05) PB - Springer CY - New York, NY, USA UR - https://doi.org/10.1007/978-3-540-30576-7_18 DO - 10.1007/978-3-540-30576-7_18 ID - Boneh2005 ER - TY - CHAP AU - Naor, M. AU - Pinkas, B. PY - 2001 DA - 2001// TI - Efficient oblivious transfer protocols BT - Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms (SODA '01) ID - Naor2001 ER - TY - CHAP AU - Naor, M. AU - Nissim, K. PY - 2001 DA - 2001// TI - Communication complexity and secure function evaluation BT - Proceedings of the Electronic Colloquium on Computational Complexity (ECCC '01) ID - Naor2001 ER - TY - CHAP AU - Cachin, C. AU - Camenisch, J. AU - Kilian, J. AU - Muller, J. PY - 2000 DA - 2000// TI - One-round secure computation and secure autonomous mobile agents BT - Proceedings of the 27th International Colloquium on Automata, Languages and Programming (ICALP '00) UR - https://doi.org/10.1007/3-540-45022-X_43 DO - 10.1007/3-540-45022-X_43 ID - Cachin2000 ER - TY - CHAP AU - Fontaine, C. AU - Galand, F. PY - 2007 DA - 2007// TI - A survey of homomorphic encryption for nonspecialists BT - EURASIP Journal on Information Security ID - Fontaine2007 ER - TY - CHAP AU - Gentry, C. PY - 2009 DA - 2009// TI - Fully homomorphic encryption using ideal lattices BT - Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC '09) UR - https://doi.org/10.1145/1536414.1536440 DO - 10.1145/1536414.1536440 ID - Gentry2009 ER - TY - STD TI - Cooney M: Ibm touts encryption innovation. Computer World, June 2009 ID - ref37 ER - TY - CHAP AU - Schneier, B. PY - 2009 DA - 2009// TI - Homomoprhic encryption breakthrough BT - Schneier on Security ID - Schneier2009 ER - TY - JOUR AU - Pailler, P. PY - 1999 DA - 1999// TI - Public-key cryptosystems based on composite degree residuosity classes JO - Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT '99) VL - 1592 ID - Pailler1999 ER - TY - CHAP AU - Erkin, Z. AU - Piva, A. AU - Katzenbeisser, S. PY - 2007 DA - 2007// TI - Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing BT - EURASIP Journal on Information Security ID - Erkin2007 ER - TY - CHAP AU - Bianchi, T. AU - Piva, A. AU - Barni, M. PY - 2008 DA - 2008// TI - Discrete cosine transform of encrypted images BT - Proceedings of the 15th IEEE International Conference on Image Processing (ICIP '08) ID - Bianchi2008 ER - TY - JOUR AU - Daugman, J. PY - 2004 DA - 2004// TI - How iris recognition works JO - IEEE Transactions on Circuits and Systems for Video Technology VL - 14 UR - https://doi.org/10.1109/TCSVT.2003.818350 DO - 10.1109/TCSVT.2003.818350 ID - Daugman2004 ER - TY - JOUR AU - Hotelling, H. PY - 1933 DA - 1933// TI - Analysis of a complex of statistical variables into principal components JO - Journal of Educational Psychology VL - 24 UR - https://doi.org/10.1037/h0071325 DO - 10.1037/h0071325 ID - Hotelling1933 ER - TY - BOOK AU - Cox, T. F. AU - Cox, M. A. PY - 2001 DA - 2001// TI - Multidimensional Scaling PB - Hall CY - Boca Raton, Fla, USA ID - Cox2001 ER - TY - CHAP AU - Faloutsos, C. AU - Lin, K. -. I. PY - 1995 DA - 1995// TI - Fastmap: a fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets BT - Proceedings of the ACM International Conference on Management of Data (SIGMOD '95) ID - Faloutsos1995 ER - TY - JOUR AU - Bourgain, J. PY - 1985 DA - 1985// TI - On lipschitz embedding of finite metric spaces in Hilbert space JO - Israel Journal of Mathematics VL - 52 UR - https://doi.org/10.1007/BF02776078 DO - 10.1007/BF02776078 ID - Bourgain1985 ER - TY - CHAP AU - Gionis, A. AU - Indyk, P. AU - Motwani, R. PY - 1999 DA - 1999// TI - Similarity search in high dimneions via hashing BT - Proceedings of the 25th International Conference on Very Large Data Bases (VLDB '99) ID - Gionis1999 ER - TY - BOOK AU - Goldreich, O. PY - 2007 DA - 2007// TI - Foundations of Cryptography: Volume 1, Basic Tools PB - Cambridge University Press CY - Cambridge, UK ID - Goldreich2007 ER - TY - CHAP AU - Mohanty, P. AU - Sarkar, S. AU - Kasturi, R. PY - 2006 DA - 2006// TI - Privacy & security issues related to match scores BT - Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '06) ID - Mohanty2006 ER - TY - BOOK AU - Katz, J. AU - Lindell, Y. PY - 2008 DA - 2008// TI - Introduction To Modern Cryptography PB - Hall CY - Boca Raton, Fla, USA ID - Katz2008 ER - TY - CHAP AU - Masek, L. AU - Kovesi, P. PY - 2003 DA - 2003// BT - Matlab source code for a biometric identification system based on iris patterns PB - The School of Computer Science and Software Engineering, The University of Western Australia CY - Perth, Australia ID - Masek2003 ER - TY - STD TI - Filho D, Barreto P: Demonstrating data possession and uncheatable data transfer. Cryptology ePrint Archive, Report 2206/150, 2006 ID - ref52 ER - TY - JOUR AU - Krohn, M. N. AU - Freedman, M. J. AU - Mazières, D. PY - 2004 DA - 2004// TI - On-the-fly verification of rateless erasure codes for efficient content distribution JO - Proceedings of the IEEE Symposium on Security and Privacy (S&P '04) VL - 2004 ID - Krohn2004 ER - TY - CHAP AU - Tan, T. AU - Sun, Z. PY - 2005 DA - 2005// BT - Casia-irisv3 ID - Tan2005 ER - TY - STD TI - Bethencourt JPaillier Library, UC Berkeley, http://acsc.cs.utexas.edu/ UR - http://acsc.cs.utexas.edu/ ID - ref55 ER -