Back to Results
First PageMeta Content
Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography


Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos
Add to Reading List

Document Date: 2011-01-06 04:06:32


Open Document

File Size: 186,82 KB

Share Result on Facebook

/

Facility

SEPIA library / /

IndustryTerm

position algorithms / collision resolution algorithm / collision resolution protocol / private sorting algorithm / communications security / privacy-preserving data mining / distributed data-mining / database systems / binary search / web-accessible databases / online stream / near real-time top / bit-decomposition protocol / distributed computing systems / average search time / distributed computing / computing / aggregation algorithms / customer networks / /

Organization

Internet Storm Center / /

Person

M. Rabin / Martin Burkhart Xenofontas Dimitropoulos / T. Rabin / R. Gennaro / /

Position

NetFlow collector / /

ProvinceOrState

Indiana / /

PublishedMedium

Communications of the ACM / /

Technology

detailed algorithm / Cryptography / LAN / collision resolution algorithm / Public Key / PPTKS protocol / two MPC protocols / MPC protocols / aggregation algorithms / expensive homomorphic encryption / ISP / data mining / private key / two protocols / IPv4 / position algorithms / private sorting algorithm / bit-decomposition protocol / collision resolution protocol / PPKT protocol / /

URL

http /

SocialTag