메뉴 건너뛰기




Volumn , Issue , 2006, Pages 535-540

Privacy-preserving data imputation

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DECISION TREES; TREES (MATHEMATICS);

EID: 41849100844     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdmw.2006.134     Document Type: Conference Paper
Times cited : (2)

References (16)
  • 1
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • May
    • R. Agrawal and R. Srikant. Privacy-preserving data mining. In ACM SIGMOD, pages 439-450, May 2000.
    • (2000) ACM SIGMOD , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 2
    • 13244283767 scopus 로고    scopus 로고
    • On regression imputation in the presence of nonignorable nonresponse
    • ASA
    • J. Beaumont. On regression imputation in the presence of nonignorable nonresponse. In The Survey Research Methods Section, pages 580-585. ASA, 2000.
    • (2000) The Survey Research Methods Section , pp. 580-585
    • Beaumont, J.1
  • 3
    • 46649117445 scopus 로고    scopus 로고
    • Bayesian networks for imputation in official statistics: A case study
    • L. Coppola, M. D. Zio, O. Luzi, A. Ponti, and M. Scanu. Bayesian networks for imputation in official statistics: A case study. In DataClean Conference, pages 30-31, 2000.
    • (2000) DataClean Conference , pp. 30-31
    • Coppola, L.1    Zio, M.D.2    Luzi, O.3    Ponti, A.4    Scanu, M.5
  • 5
    • 0000238915 scopus 로고
    • An overview of hot-deck procedures
    • chapter Academic Press
    • B. L. Ford. Incomplete data in sample surveys, chapter An overview of hot-deck procedures. Academic Press, 1983.
    • (1983) Incomplete Data in Sample Surveys
    • Ford, B.L.1
  • 7
    • 26444451487 scopus 로고    scopus 로고
    • On secure scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In 7th ICISC, 2004.
    • (2004) 7th ICISC
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikainen, T.4
  • 9
    • 0033225727 scopus 로고    scopus 로고
    • Imputation of missing data in industrial databases
    • K. Lakshminarayan, S. A. Harp, and T. Samad. Imputation of missing data in industrial databases. Applied Intelligence, 11(3):259-275, 1999.
    • (1999) Applied Intelligence , vol.11 , Issue.3 , pp. 259-275
    • Lakshminarayan, K.1    Harp, S.A.2    Samad, T.3
  • 10
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Y. Lindell and B. Pinkas. Privacy preserving data mining. J. Cryptol., 15(3):177-206, 2002.
    • (2002) J. Cryptol. , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 12
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In STOC, pages 590-599, 2001.
    • (2001) STOC , pp. 590-599
    • Naor, M.1    Nissim, K.2
  • 13
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31st STOC, pages 245-254, 1999.
    • (1999) 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residue classes
    • EUROCRYPT 99, Springer-Verlag
    • P. Paillier. Public-key cryptosystems based on composite degree residue classes. In EUROCRYPT 99, volume 1592 of LNCS, pages 223-238. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 16
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • A. C. Yao. How to generate and exchange secrets. In 27th FOCS, pages 162-167, 1986.
    • (1986) 27th FOCS , pp. 162-167
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.