Back to Results
First PageMeta Content
Information / Secure multi-party computation / Oblivious transfer / Secure two-party computation / Communications protocol / Lookup table / Transmission Control Protocol / Zero-knowledge proof / One-way function / Cryptographic protocols / Data / Computing


Cryptographic techniques for privacy-preserving data mining Benny Pinkas HP Labs [removed]
Add to Reading List

Document Date: 2004-01-09 00:12:19


Open Document

File Size: 133,68 KB

Share Result on Facebook

City

Washington DC / /

Company

Aiken Computation Laboratory / Benny Pinkas HP Labs / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

The Crypto++ library / /

IndustryTerm

privacy preserving solution / oblivious transfer protocols / secure protocols / generic solutions / required communication infrastructure / private protocols / data mining algorithm / Privacy preserving protocols / web application / multi-party protocols / data mining / data mining algorithms / possible solutions / privacy preserving protocol / distributed computing scenario / exhaustive search / proxy oblivious transfer protocol / basic algorithm / constant-round protocol / Internet environment / short protocol / secure computation protocol / basic protocol / cryptographic protocols / oblivious transfer protocol / secure protocol / circuit computing / greedy algorithm / e.g. functions computing multiplications / generic protocol / trivial solution / e - commerce / web server / computing / Yao protocol / /

Person

Ronald Cramer / Beaver / Oded Goldreich / Encoding Bob / O. Rabin / Alice / /

Position

malicious auctioneer / researcher / auctioneer / /

Product

Signing Contracts / ID3 / Beaver / /

PublishedMedium

Journal of the ACM / the Theory of Computing / Communications of the ACM / Journal of Cryptology / Theory of Computing / Lecture Notes in Computer Science / /

Technology

oblivious transfer protocol / two-party protocol / generic Yao protocol / The multi-party protocols / ID3 algorithm / generic two-party protocol / e.g. public key encryption / private key / simpler OPE protocol / secure computation protocol / html / multi-party protocols / encryption / proxy oblivious transfer protocol / cryptography / constant-round protocol / distributed algorithm / public key / basic protocol / unconditionally secure protocols / data mining algorithms / Privacy preserving protocols / greedy algorithm / short protocol / generic protocol / data mining / secure protocol / privacy preserving protocol / oblivious transfer protocols / data mining algorithm / basic ID3 algorithm / web server / basic algorithm / /

URL

http /

SocialTag