Privacy-preserving data mining: methods, metrics, and applications

R Mendes, JP Vilela - IEEE Access, 2017 - ieeexplore.ieee.org
The collection and analysis of data are continuously growing due to the pervasiveness of
computing devices. The analysis of such information is fostering businesses and …

Privacy in the genomic era

M Naveed, E Ayday, EW Clayton, J Fellay… - ACM Computing …, 2015 - dl.acm.org
Genome sequencing technology has advanced at a rapid pace and it is now possible to
generate highly-detailed genotypes inexpensively. The collection and analysis of such data …

SpOT-light: lightweight private set intersection from sparse OT extension

B Pinkas, M Rosulek, N Trieu, A Yanai - … Barbara, CA, USA, August 18–22 …, 2019 - Springer
We describe a novel approach for two-party private set intersection (PSI) with semi-honest
security. Compared to existing PSI protocols, ours has a more favorable balance between …

Foundations of garbled circuits

M Bellare, VT Hoang, P Rogaway - … of the 2012 ACM conference on …, 2012 - dl.acm.org
Garbled circuits, a classical idea rooted in the work of Yao, have long been understood as a
cryptographic technique, not a cryptographic goal. Here we cull out a primitive …

Private set intersection in the internet setting from lightweight oblivious PRF

M Chase, P Miao - Advances in Cryptology–CRYPTO 2020: 40th Annual …, 2020 - Springer
We present a new protocol for two-party private set intersection (PSI) with semi-honest
security in the plain model and one-sided malicious security in the random oracle model …

Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation

RL Lagendijk, Z Erkin, M Barni - IEEE Signal Processing …, 2012 - ieeexplore.ieee.org
In recent years, signal processing applications that deal with user-related data have aroused
privacy concerns. For instance, face recognition and personalized recommendations rely on …

Hawkes processes for events in social media

MA Rizoiu, Y Lee, S Mishra, L Xie - Frontiers of multimedia research, 2017 - dl.acm.org
This chapter provides an accessible introduction for point processes, and especially Hawkes
processes, for modeling discrete, inter-dependent events over continuous time. We start by …

Countering gattaca: efficient and secure testing of fully-sequenced human genomes

P Baldi, R Baronio, E De Cristofaro, P Gasti… - Proceedings of the 18th …, 2011 - dl.acm.org
Recent advances in DNA sequencing technologies have put ubiquitous availability of fully
sequenced human genomes within reach. It is no longer hard to imagine the day when …

Computationally efficient searchable symmetric encryption

P Van Liesdonk, S Sedghi, J Doumen, P Hartel… - … Data Management: 7th …, 2010 - Springer
Searchable encryption is a technique that allows a client to store documents on a server in
encrypted form. Stored documents can be retrieved selectively while revealing as little …

Addressing the concerns of the lacks family: quantification of kin genomic privacy

M Humbert, E Ayday, JP Hubaux, A Telenti - Proceedings of the 2013 …, 2013 - dl.acm.org
The rapid progress in human-genome sequencing is leading to a high availability of
genomic data. This data is notoriously very sensitive and stable in time. It is also highly …