-
1
-
-
0041783510
-
Privacy-preserving data mining
-
May
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In ACM SIGMOD, pages 439-450, May 2000.
-
(2000)
ACM SIGMOD
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
13244283767
-
On regression imputation in the presence of nonignorable nonresponse
-
ASA
-
J. Beaumont. On regression imputation in the presence of nonignorable nonresponse. In The Survey Research Methods Section, pages 580-585. ASA, 2000.
-
(2000)
The Survey Research Methods Section
, pp. 580-585
-
-
Beaumont, J.1
-
3
-
-
46649117445
-
Bayesian networks for imputation in official statistics: A case study
-
L. Coppola, M. D. Zio, O. Luzi, A. Ponti, and M. Scanu. Bayesian networks for imputation in official statistics: A case study. In DataClean Conference, pages 30-31, 2000.
-
(2000)
DataClean Conference
, pp. 30-31
-
-
Coppola, L.1
Zio, M.D.2
Luzi, O.3
Ponti, A.4
Scanu, M.5
-
5
-
-
0000238915
-
An overview of hot-deck procedures
-
chapter Academic Press
-
B. L. Ford. Incomplete data in sample surveys, chapter An overview of hot-deck procedures. Academic Press, 1983.
-
(1983)
Incomplete Data in Sample Surveys
-
-
Ford, B.L.1
-
7
-
-
26444451487
-
On secure scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In 7th ICISC, 2004.
-
(2004)
7th ICISC
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
9
-
-
0033225727
-
Imputation of missing data in industrial databases
-
K. Lakshminarayan, S. A. Harp, and T. Samad. Imputation of missing data in industrial databases. Applied Intelligence, 11(3):259-275, 1999.
-
(1999)
Applied Intelligence
, vol.11
, Issue.3
, pp. 259-275
-
-
Lakshminarayan, K.1
Harp, S.A.2
Samad, T.3
-
10
-
-
33746437508
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptol., 15(3):177-206, 2002.
-
(2002)
J. Cryptol.
, vol.15
, Issue.3
, pp. 177-206
-
-
Lindell, Y.1
Pinkas, B.2
-
12
-
-
0034819509
-
Communication preserving protocols for secure function evaluation
-
M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In STOC, pages 590-599, 2001.
-
(2001)
STOC
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
13
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31st STOC, pages 245-254, 1999.
-
(1999)
31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
14
-
-
84942550998
-
Public-key cryptosystems based on composite degree residue classes
-
EUROCRYPT 99, Springer-Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residue classes. In EUROCRYPT 99, volume 1592 of LNCS, pages 223-238. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
16
-
-
0022882770
-
How to generate and exchange secrets
-
A. C. Yao. How to generate and exchange secrets. In 27th FOCS, pages 162-167, 1986.
-
(1986)
27th FOCS
, pp. 162-167
-
-
Yao, A.C.1
|