Back to Results
First PageMeta Content
Public-key cryptography / Categorical data / Electronic commerce / Logistic regression / XTR / Linear regression / RSA / Paillier cryptosystem / Mental poker / Statistics / Regression analysis / Econometrics


2015 IEEE CS Security and Privacy Workshops Privacy-Preserving Statistical Analysis by Exact Logistic Regression David A. duVerle∗† , Shohei Kawasaki‡ , Yoshiji Yamada§ , Jun Sakuma‡¶ and Koji Tsuda∗
Add to Reading List

Document Date: 2015-05-21 15:25:23


Open Document

File Size: 666,31 KB

Share Result on Facebook

City

Tsu / Tsukuba / /

Company

Brown / SIAM Journal / SPSS / Monte Carlo / Intel / /

Country

Japan / Jordan / /

/

Event

FDA Phase / /

Facility

University of Tsukuba / Mie University / R. Hall / University of Tokyo / R. J. Hall / Nagoya Institute of Technology / /

IndustryTerm

inner-products / biotechnology / sub-protocols / re-encryption using algorithm / inner product / inner products / efficient solutions / efficient protocol / oblivious protocol / real-life applications / privacy-preserving data mining / comparison protocol / encrypted communications / secure protocol / oblivious multiplication protocol / bit-decomposition protocol / /

MusicGroup

Blood / /

Organization

University of Tsukuba / Mie University / American Statistical Association / Life Science Research Center / University of Tokyo / American Society of Nephrology / Graduate School / vol. / Nagoya Institute of Technology / Alice / /

Person

Taylor / Ichiro Takeuchi / Kota Matsui / Shohei Kawasaki / Alice Bob Reordering / Francis / Noboru Kunihiro / David A. Duverle / Jun Sakuma / Koji Tsuda / /

/

Position

IND-CPA / Private / /

Product

Special Case / B13 / D3 / Framework1 / S2 / /

ProvinceOrState

Hawaii / /

PublishedMedium

American Journal of Human Genetics / The American Journal of Human Genetics / SIAM Journal on Computing / Journal of the American Statistical Association / /

RadioStation

Core / /

SportsEvent

formula 1 / /

Technology

oblivious multiplication protocol / Bioinformatics / GT-SCOT protocol / efficient protocol / E The protocol / biotechnology / Paillier encryption / FSLR protocol / oblivious protocol / 9 Algorithm / two protocols / genotyping / re-encryption using algorithm / ERO protocol / bit-decomposition protocol / fresh encryption / sampling-based secure protocol / two algorithms / resulting protocol / encryption / Cryptography / pharmacogenetics / Logistic Regression protocol / public key / 2 Re-Encryption / Java / 10 algorithm / data mining / SNP / GT comparison protocol / end procedure Algorithm / secure protocol / main protocol / publiclyavailable Privacy-Preserving Protocol / 1024bit encryption / /

SocialTag