J. Vaidya and C. Clifton, Privacy Preserving Na¨?veNa¨?ve Bayes Classifier for Vertically Partitioned Data, SIAM International Conference on Data Mining, pp.522-526, 2004.
DOI : 10.1137/1.9781611972740.59

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.215.2035

J. Douceur, The Sybil attack. Peer-to-peer Systems, pp.251-260, 2002.
DOI : 10.1007/3-540-45748-8_24

H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao, DSybil: Optimal Sybilresistance for Recommendation Systems, 30th IEEE Symposium on Security and Privacy, pp.283-298, 2009.
DOI : 10.1109/sp.2009.26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.151.193

A. C. Yao, How to generate and exchange secrets, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986), pp.162-167, 1986.
DOI : 10.1109/SFCS.1986.25

J. Zhou and T. Luo, A novel approach to solve the sparsity problem in collaborative filtering, 2010 International Conference on Networking, Sensing and Control (ICNSC), pp.165-170, 2010.
DOI : 10.1109/ICNSC.2010.5461512

. Grouplens, GroupLens Research, 2010.

R. Agrawal, A. Evfimievski, and R. Srikant, Information sharing across private databases, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.86-97, 2003.
DOI : 10.1145/872757.872771

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.3600

M. J. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, Advances in Cryptology ? EUROCRYPT'04, pp.1-19, 2004.
DOI : 10.1007/978-3-540-24676-3_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.127.931

J. Vaidya and C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, vol.13, issue.4, pp.593-622, 2005.
DOI : 10.3233/JCS-2005-13401

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.158.8995

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Advances in Cryptology ? EUROCRYPT'99, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.4035

D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, Fairplay ? a secure two-party computation system, The 13th USENIX Conference on Security Symposium, USENIX Association, p.20, 2004.

W. Du and M. J. Atallah, Privacy-preserving cooperative statistical analysis, 17th Annual Computer Security Applications Conference, pp.102-110, 2001.

H. Kikuchi, H. Kizawa, and M. Tada, Privacy-Preserving Collaborative Filtering Schemes, 2009 International Conference on Availability, Reliability and Security, pp.911-916, 2009.
DOI : 10.1109/ARES.2009.148

B. Sarwar, G. Karypis, J. Konstan, and J. Reidl, Item-based collaborative filtering recommendation algorithms, Proceedings of the tenth international conference on World Wide Web , WWW '01, pp.285-295, 2001.
DOI : 10.1145/371920.372071

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.29.340&rep=rep1&type=pdf