-
1
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX, ACM
-
Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, Dallas, TX, ACM (2000) 439-450
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
26444581579
-
Controlled data-swapping techniques for masking public use microdata sets
-
U.S. Bureau of the Census, Washington, DC.
-
Moore, Jr., R.A.: Controlled data-swapping techniques for masking public use microdata sets. Statistical Research Division Report Series RR 96-04, U.S. Bureau of the Census, Washington, DC. (1996)
-
(1996)
Statistical Research Division Report Series RR 96-04
-
-
Moore Jr., R.A.1
-
3
-
-
0018444418
-
Secure databases: Protection against user influence
-
Dobkin, D., Jones, A.K., Lipton, R.J.: Secure databases: Protection against user influence. ACM Transactions on Database Systems 4 (1979) 97-106
-
(1979)
ACM Transactions on Database Systems
, vol.4
, pp. 97-106
-
-
Dobkin, D.1
Jones, A.K.2
Lipton, R.J.3
-
9
-
-
26444497804
-
General cryptographic protocols
-
Cambridge University Press
-
Goldreich, O.: General Cryptographic Protocols. In: The Foundations of Cryptography. Volume 2. Cambridge University Press (2004)
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
11
-
-
1642302606
-
Building decision tree classifier on private data
-
Clifton, C., Estivill-Castro, V., eds. Maebashi City, Japan, Australian Computer Society
-
Du, W., Zhan, Z.: Building decision tree classifier on private data. In Clifton, C., Estivill-Castro, V., eds.: IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining. Volume 14., Maebashi City, Japan, Australian Computer Society (2002) 1-8
-
(2002)
IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
Du, W.1
Zhan, Z.2
-
12
-
-
2942536415
-
Privacy preserving naïve bayes classifier for vertically partitioned data
-
Lake Buena Vista, Florida
-
Vaidya, J., Clifton, C.: Privacy preserving naïve bayes classifier for vertically partitioned data. In: 2004 SIAM International Conference on Data Mining, Lake Buena Vista, Florida (2004) 522-526
-
(2004)
2004 SIAM International Conference on Data Mining
, pp. 522-526
-
-
Vaidya, J.1
Clifton, C.2
-
13
-
-
33749540392
-
Privately computing a distributed k-nn classifier
-
Boulicaut, J.F., Esposito, F., Giannotti, F., Pedreschi, D., eds. Pisa, Italy
-
Kantarcioǧlu, M., Clifton, C.: Privately computing a distributed k-nn classifier. In Boulicaut, J.F., Esposito, F., Giannotti, F., Pedreschi, D., eds.: PKDD2004: 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, Pisa, Italy (2004) 279-290
-
(2004)
PKDD2004: 8th European Conference on Principles and Practice of Knowledge Discovery in Databases
, pp. 279-290
-
-
Kantarcioǧlu, M.1
Clifton, C.2
-
14
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, WA
-
Kantarcioǧlu, M., Jin, J., Clifton, C.: When do data mining results violate privacy? In: Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, WA (2004) 599-604
-
(2004)
Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 599-604
-
-
Kantarcioǧlu, M.1
Jin, J.2
Clifton, C.3
-
15
-
-
4344559647
-
Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
-
Oakland, CA
-
Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA (1998)
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Samarati, P.1
Sweeney, L.2
-
19
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24 (1978) 106-110
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
|