Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Privacy Preserving Distributed Data Mining, Zhenmin Lin Jan 2012

Privacy Preserving Distributed Data Mining, Zhenmin Lin

Theses and Dissertations--Computer Science

Privacy preserving distributed data mining aims to design secure protocols which allow multiple parties to conduct collaborative data mining while protecting the data privacy. My research focuses on the design and implementation of privacy preserving two-party protocols based on homomorphic encryption. I present new results in this area, including new secure protocols for basic operations and two fundamental privacy preserving data mining protocols.

I propose a number of secure protocols for basic operations in the additive secret-sharing scheme based on homomorphic encryption. I derive a basic relationship between a secret number and its shares, with which we develop efficient secure …


Measuring Effectiveness Of Address Schemes For As-Level Graphs, Yinfang Zhuang Jan 2012

Measuring Effectiveness Of Address Schemes For As-Level Graphs, Yinfang Zhuang

Theses and Dissertations--Computer Science

This dissertation presents measures of efficiency and locality for Internet addressing schemes.

Historically speaking, many issues, faced by the Internet, have been solved just in time, to make the Internet just work~\cite{justWork}. Consensus, however, has been reached that today's Internet routing and addressing system is facing serious scaling problems: multi-homing which causes finer granularity of routing policies and finer control to realize various traffic engineering requirements, an increased demand for provider-independent prefix allocations which injects unaggregatable prefixes into the Default Free Zone (DFZ) routing table, and ever-increasing Internet user population and mobile edge devices. As a result, the DFZ routing …