Abstract—A secure ad-hoc survey scheme enables a survey authority to independently (without any interac-tion) select an ad-hoc group of registered users based only on their identities (e.g., their email addresses), and create a survey where only selected users can anonymously submit exactly one response. We present a formalization of secure ad-hoc surveys and a provably-secure implemen-tation in the random oracle model, called ANONIZE. Our performance analysis shows that ANONIZE enables securely implementing million-person anonymous surveys using a single modern workstation. As far as we know, ANONIZE constitutes the first implementation of a large-scale secure computation protocol (of non-trivial functionalities) that scales to millions of...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
Anonymous network helps to preserve user identity for secure communication in the network. The paper...
A secure ad-hoc survey scheme enables a survey authority to independently (with-out any interaction)...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
The popularity of internet as a communication medium whether for personal or business requires anon...
In this paper, we study a problem of protecting privacy of individuals in large public survey rating...
Recent study shows that supposedly anonymous movie rating records are de-identified by using a littl...
In this paper, we study a problem of privacy protection in large survey rating data. The rating dat...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
Collecting data via a questionnaire and analyzing them while preserving respondents' privacy may inc...
Abstract—This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
Anonymous network helps to preserve user identity for secure communication in the network. The paper...
A secure ad-hoc survey scheme enables a survey authority to independently (with-out any interaction)...
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwil...
The popularity of internet as a communication medium whether for personal or business requires anon...
In this paper, we study a problem of protecting privacy of individuals in large public survey rating...
Recent study shows that supposedly anonymous movie rating records are de-identified by using a littl...
In this paper, we study a problem of privacy protection in large survey rating data. The rating dat...
Publish-subscribe is an increasingly popular messaging pattern for distributed systems, supporting s...
Anonymous communication protocols are indispensable to protect users' privacy in open networks such ...
The modern internet and phone networks offer very little security, privacy, or accountability to the...
Abstract. The design of anonymous communication systems is a rel-atively new field, but the desire t...
Collecting data via a questionnaire and analyzing them while preserving respondents' privacy may inc...
Abstract—This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the...
We live in an era when political and commercial entities are increasingly engaging in sophisticated ...
Protection of privacy has become an important problem in data mining. In particular, individuals hav...
Anonymous network helps to preserve user identity for secure communication in the network. The paper...