Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

邮发代号 80-970

2019 Impact Factor: 1.275

Frontiers of Computer Science  2020, Vol. 14 Issue (5): 145611   https://doi.org/10.1007/s11704-019-9063-7
  本期目录
Efficient private multi-party numerical records matching
Shumin HAN, Derong SHEN(), Tiezheng NIE, Yue KOU, Ge YU
College of Computer Science and Engineering, Northeastern University, Shenyang 110167, China
 全文: PDF(123 KB)  
收稿日期: 2019-02-21      出版日期: 2020-01-20
Corresponding Author(s): Derong SHEN   
 引用本文:   
. [J]. Frontiers of Computer Science, 2020, 14(5): 145611.
Shumin HAN, Derong SHEN, Tiezheng NIE, Yue KOU, Ge YU. Efficient private multi-party numerical records matching. Front. Comput. Sci., 2020, 14(5): 145611.
 链接本文:  
https://academic.hep.com.cn/fcs/CN/10.1007/s11704-019-9063-7
https://academic.hep.com.cn/fcs/CN/Y2020/V14/I5/145611
1 D Vatsalan, P Christen, V S Verykios. A taxonomy of privacypreserving record linkage techniques. Information Systems Journal, 2013, 38(6): 946–969
https://doi.org/10.1016/j.is.2012.11.005
2 V S Verykios, A Karakasidis, V Mitrogiannis. Privacy preserving record linkage approaches. International Journal of DataMining, Modelling and Management, 2009, 1(2): 206–221
https://doi.org/10.1504/IJDMMM.2009.026076
3 T Churches, P Christen. Some methods for blindfolded record linkage. BMC Medical Informatics and Decision Making, 2004, 4(1): 9
https://doi.org/10.1186/1472-6947-4-9
4 C O’Keefe, M Yung, L Gu, R Baxter. Privacy-preserving data linkage protocols. In: Processings of ACM Workshop on Privacy in the Electronic Society. 2004, 94–102
https://doi.org/10.1145/1029179.1029203
5 S Trepetin. Privacy-preserving string comparisons in record linkage systems: a review. Information Security Journal: A Global Perspective, 2008, 17(5–6): 253–266
https://doi.org/10.1080/19393550802492503
6 P Ravikumar, W Cohen, S Fienberg. A secure protocol for computing string distance metrics. In: Processings of IEEE Workshop on Privacy and Security Aspects of Data Mining Held at ICDM. 2004, 40–46
7 D Vatsalan, P Christen. Privacy-preserving matching of similar patients. Journal of Biomedical Informatics, 2016, 59: 285–298
https://doi.org/10.1016/j.jbi.2015.12.004
8 G L Xiang, X M Chen. Homomorapic encryption scheme in the range of the real. Journal of Computer Engineering Application, 2005, 20: 12–14
[1] Article highlights Download
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed