Sciweavers

185 search results - page 7 / 37
» Efficiently computing private recommendations
Sort
View
SIGMOD
2008
ACM
130views Database» more  SIGMOD 2008»
14 years 6 months ago
From del.icio.us to x.qui.site: recommendations in social tagging sites
We present x.qui.site, a scalable system for managing recommendations for social tagging sites like del.icio.us. seamlessly incorporates various user behaviors into the recommenda...
Sihem Amer-Yahia, Alban Galland, Julia Stoyanovich...
FC
2006
Springer
94views Cryptology» more  FC 2006»
13 years 10 months ago
Private Policy Negotiation
With the increasing importance of correctly handling privacy-sensitive data, significant work has been put in expressing and enforcing privacy policies. Less work has been done ho...
Klaus Kursawe, Gregory Neven, Pim Tuyls
STOC
2001
ACM
119views Algorithms» more  STOC 2001»
14 years 7 months ago
Private approximation of NP-hard functions
d Abstract] Shai Halevi Robert Krauthgamer Eyal Kushilevitz Kobbi Nissim ? The notion of private approximation was introduced recently by Feigenbaum, Fong, Strauss and Wright. Inf...
Shai Halevi, Robert Krauthgamer, Eyal Kushilevitz,...
ASIACRYPT
2010
Springer
13 years 4 months ago
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party ("client") to compute an intersection of its input set with that of another party ("server"), such tha...
Emiliano De Cristofaro, Jihye Kim, Gene Tsudik
ICISC
2008
103views Cryptology» more  ICISC 2008»
13 years 8 months ago
Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification
Secure Evaluation of Private Functions (PF-SFE) allows two parties to compute a private function which is known by one party only on private data of both. It is known that PF-SFE c...
Ahmad-Reza Sadeghi, Thomas Schneider 0003