Efficient Network Aware Search in Collaborative Tagging Sites, 2008. ,
Gossiping personalized queries, Proceedings of the 13th International Conference on Extending Database Technology, EDBT '10, pp.22-26, 2010. ,
DOI : 10.1145/1739041.1739055
URL : https://hal.archives-ouvertes.fr/inria-00455643
A face is exposed for AOL searcher No. 4417749, New York Times, 2006. ,
The Gossple Anonymous Social Network, 2010. ,
DOI : 10.1007/978-3-642-16955-7_10
URL : https://hal.archives-ouvertes.fr/hal-01055283
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, 1982. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.128.8210
Multiparty Computation from Threshold Homomorphic Encryption, EUROCRYPT'01, 2001. ,
DOI : 10.1007/3-540-44987-6_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.5028
A Generalisation, a Simplification and some Applications of Paillier???s Probabilistic Public-Key System, PKC'01, pp.13-15, 2001. ,
DOI : 10.7146/brics.v7i45.20212
Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.9-13, 2004. ,
Differential Privacy: A Survey of Results, TAMC'08. Xi'an, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Our Data, Ourselves: Privacy Via Distributed Noise Generation, EUROCRYPT'06. St, 2006. ,
DOI : 10.1007/11761679_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.3527
Calibrating Noise to Sensitivity in Private Data Analysis, TCC'06, 2006. ,
DOI : 10.1007/11681878_14
On Private Scalar Product Computation for Privacy-Preserving Data Mining, 2004. ,
DOI : 10.1007/11496618_9
Foundations of Cryptography, 2001. ,
Properties of the Extended Hypergeometric Distribution. The Annals of, Mathematical Statistics, vol.36, issue.3, 1965. ,
´ Etude Comparative de la Distribution Florale dans une Portion des Alpes et des Jura, Bulletin de la Société Vaudoise des Sciences Naturelles, vol.37, issue.142, 1901. ,
Gossip-based peer sampling, ACM Transactions on Computer Systems, vol.25, issue.3, p.25, 2007. ,
DOI : 10.1145/1275517.1275520
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.501
What Can We Learn Privately? In: FOCS'08, 2008. ,
Privacy-Preserving Set Operations, CRYPTO'05, 2005. ,
DOI : 10.1007/11535218_15
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.2481
Differentially private recommender systems, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, 2009. ,
DOI : 10.1145/1557019.1557090
Robust De-anonymization of Large Sparse Datasets, 2008 IEEE Symposium on Security and Privacy (sp 2008), 2008. ,
DOI : 10.1109/SP.2008.33
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.22
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol, PKC'07, 2007. ,
DOI : 10.1007/978-3-540-71677-8_23
Distributed Paillier Cryptosystem without Trusted Dealer, Jeju Island, 2010. ,
DOI : 10.1007/978-3-642-17955-6_4
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Crowds: anonymity for Web transactions, TISSEC'98, 1998. ,
DOI : 10.1145/290163.290168
Privacy Preserving Nearest Neighbor Search, 2006. ,
Privacy-preserving Bayesian network structure computation on distributed heterogeneous data, Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '04, pp.22-25, 2004. ,
DOI : 10.1145/1014052.1014145
Private Distributed Scalar Product Protocol With Application To Privacy-Preserving Computation of Trust, IFIPTM'07, 2007. ,
DOI : 10.1007/978-0-387-73655-6_1