">
TCS / Studies / T-79.514 Special Course on CryptologyMissing presenter/opponent names means that the corresponding position is still open. (In such cases, the concrete topic might be relocated to a different date.) Missing topic names means that the course has not yet been planned to this far in such a level of details. In preparing your own survey, please use Petteri's .tex file as a formatting example. (See here for the outcomes of T79-511 in 2001.) Please also use the slide templates: template.tex and init.tex. Process your slides, if possible, by pdflatex, and return them in a .pdf format. The survey could be returned in .ps, .pdf or both.
Preliminary (tentative! The order might be rescheduled, topics changed, etc) schedule follows. Details can be changed, so be uptodate!
Holes in the schedule: most probably, the seminars on 15.10 and 26.11 will be cancelled. It will be announced in advance. To compensate it, we will have 2 seminars on some of the Wednesdays.
Date | Subject | (sl)ides, (su)rveys | Presenter | Opponent | Suggested reading | |
---|---|---|---|---|---|---|
10.09.2003 | Course introduction. Giving the assignments | |||||
General intro | sl | Helger Lipmaa | - | - | ||
17.09.2003 | Cryptography for data-miners: what is possible and what is not | sl | Helger Lipmaa | - | May be Multi party computations: past and present (Shafi Goldwasser, ACM PODC 1997) | |
DM for cryptographers | sl | Ella Bingham | - | From Data Mining to Knowledge Discovery in > Databases" by Usama Fayyad, Gregory Piatetsky-Shapiro, and > Padhraic Smyth. AI Magazine 17(3): Fall 1996, 37-54. | ||
24.09.2003 | Cryptographic Techniques for Privacy-Preserving Data Mining | su sl re (corrected, added 07.12.03) | Alexey Vyskubov | Johan Wallén | Cryptographic Techniques for Privacy-Preserving Data Mining (Benny Pinkas, Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining, January 2003), Privacy Preserving Data Mining (Yehuda Lindell and Benny Pinkas, Crypto 2000) | OK |
01.10.2003 | Intro to PPDM | su sl re (corrected, 15.01.04) | Xavier Rondé-Oustau | Tatiana Issaeva | Privacy-Preserving Data Mining (Rakesh Agrawal, Ramakrishnan Srikant, SIGMOD 2000) | |
08.10.2003 | Database randomization via RRT | su sl re (corrected survey: 29.11.03) | Isto Niemi | Emilia Oikarinen | Privacy Preserving Mining of Association Rules (Evfimievski, R. Srikant, R. Agrawal and J. Gehrke, KDD 2002), Using Randomized Response Techniques for Privacy-Preserving Data Mining (Wenliang Du and Zhijun Zhan, SIGKDD 2003) | OK |
15.10.2003 | Cancelled | |||||
22.10.2003 | Cryptographic RRT | su sl (corrected, posted 29.10.03) | Ella Bingham | (Helger Lipmaa) | Cryptographic Randomized Response Techniques (Andris Ambainis, Markus Jakobsson and Helger Lipmaa, eprint 2003/027) | |
Frequent Pattern Mining (survey) | Bart Goethals | - | Survey on Frequent Pattern Mining (Bart Goethals, 2003) | |||
29.10.2003 | Reconstruction of databases | su sl re (corrected, posted 04.11.03) | Emilia Oikarinen | Isto Niemi | Revealing information while preserving privacy (Irit Dinur, Kobbi Nissim, SIGMOD 2003) | OK |
05.11.2003 | Private Information Retrieval | su sl re (corrected survey: 21.11.03) | Vesa Vaskelainen | Xavier Rondé-Oustau | Links (Protecting Data Privacy in Private Information Retrieval Schemes, Quantum Symmetrically-Private Information Retrieval) | OK |
Privacy-Preserving K-Means Clustering over Vertically Partitioned Data | su sl re (corrected, 07.12.03) | Tatiana Issaeva | Matti Järvisalo | Privacy-Preserving K-Means Clustering over Vertically Partitioned Data (Jaideep Vaidya, Chris Clifton) | Pending | |
12.11.2003 | Private function evaluation | su sl re (corrected survey: 24.11.03) | Johan Wallén | Alexey Vyskubov | Selective Private Function Evaluation with Applications to Private Statistics (Ran Canetti, Yuval Ishai, Ravi Kumar, Michael K. Reiter, Ronitt Rubinfeld, Rebecca N. Wright, 2001) | OK |
On inverse frequent set mining | Taneli J. Mielikäinen | - | On inverse frequent set mining (Taneli J. Mielikäinen, 2nd Workshop on Privacy Preserving Data Mining) | |||
19.11.2003 | Secure Approximate Matching | su sl re (corrected, 07.11.03) | Matti Järvisalo | Sami Vaarala | Protocols For Secure Remote database Access With Approximate Matching (Wenliang Du, Mikhail J. Atallah, ACM SPE 2000) | OK |
Cryptanalysis of SAM | su sl re (corrected, 09.01.04) | Sami Vaarala | Vesa Vaskelainen | Vulnerabilities in Similarity Search Based Systems (Ali Saman Tosun, Hakan Ferhatosmanoglu, CIKM 2002) | OK | |
26.11.2003 | Most probably cancelled |
The choice of the topics is not final. If you have a topic yourself, please let me know.