-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, CA, pp, May 21-23
-
D. Agrawal and C. Aggarwal, "On the design and quantification of privacy preserving data mining algorithms," In Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA, pp. 247-255, May 21-23, 2001.
-
(2001)
Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
Agrawal, D.1
Aggarwal, C.2
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
ACM Press, pp, May
-
R. Agrawal and R. Srikant, "Privacy-preserving data mining," In Proceedings of the ACM SIGMOD Conference on Management of Data, ACM Press, pp. 439-450, May 2000.
-
(2000)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
0022145479
-
Security without identification
-
Oct
-
D. Chaum, "Security without identification," In Communication of the ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985.
-
(1985)
Communication of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
0004116989
-
-
MIT Press and McGraw-Hill, second edition edition
-
T. Cormen, C. Leiserson, R. Rivest, and C. Stein, Introduction to Algorithms. MIT Press and McGraw-Hill, second edition edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
5
-
-
0031642212
-
Noninteractive and non-malleable commitment
-
G. Crescenzo, Y. Ishai, and R. Ostrovsky, "Noninteractive and non-malleable commitment," In Proceedings of the Annual ACM Symposium on the Theory of Computing STOC98, pp. 141-150, 1998.
-
(1998)
Proceedings of the Annual ACM Symposium on the Theory of Computing STOC98
, pp. 141-150
-
-
Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
6
-
-
85028450627
-
Non-malleable cryptography
-
New Orleans, Louisiana, USA, pp
-
D. Dolev, D. Dwork, and M. Naor, "Non-malleable cryptography," In Proceedings of the Twenty-third Annual ACM Symposium on Theory of Computing, New Orleans, Louisiana, USA, pp. 542-552, 1991.
-
(1991)
Proceedings of the Twenty-third Annual ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, D.2
Naor, M.3
-
7
-
-
1642302606
-
Building decision tree classifier on private data
-
Maebashi City, Japan, Dec. 9
-
W. Du and Z. Zhan, "Building decision tree classifier on private data," In IEEE Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, Dec. 9, 2002.
-
(2002)
IEEE Workshop on Privacy, Security, and Data Mining
-
-
Du, W.1
Zhan, Z.2
-
8
-
-
77952334884
-
Using randomized response techniques for privacy-preserving data mining
-
Washington, DC, USA, Aug. 24-27
-
W. Du and Z. Zhan, "Using randomized response techniques for privacy-preserving data mining," In Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Washington, DC, USA, Aug. 24-27, 2003.
-
(2003)
Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Du, W.1
Zhan, Z.2
-
10
-
-
0003642109
-
Boosting and naive bayesian learning
-
Technical Report CS97-557, University of California, San Diego
-
C. Elkan, Boosting and naive bayesian learning. Technical Report CS97-557, University of California, San Diego, 1997.
-
(1997)
-
-
Elkan, C.1
-
11
-
-
42949146327
-
-
Epic, Privacy and human rights an international survey of privacy laws and developments. Electronic Privacy Information Center, www.epic.org, May, 2003.
-
Epic, "Privacy and human rights an international survey of privacy laws and developments. Electronic Privacy Information Center, www.epic.org, May, 2003.
-
-
-
-
12
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, Canada, July 23-26
-
A. Evfmievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy preserving mining of association rules," In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 217-228, Edmonton, Alberta, Canada, July 23-26, 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfmievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
19
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Prague, Czech Republic
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," In Advances in Cryptography-EUROCRYPT'99, pp. 223-238, Prague, Czech Republic, 1999.
-
(1999)
Advances in Cryptography-EUROCRYPT'99
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
0005301490
-
On data banks and privacy homomorphisms
-
eds. R. A. DeMillo et al, Academic Press, pp
-
R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," In Foundations of Secure Computation, eds. R. A. DeMillo et al., Academic Press, pp. 169-179, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.1
Adleman, L.2
Dertouzos, M.3
-
21
-
-
0242709355
-
Privacy preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada, July 23-26
-
J. Vaidya and C. Clifton, "Privacy preserving association rule mining in vertically partitioned data," In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, 2002.
-
(2002)
Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Vaidya, J.1
Clifton, C.2
-
26
-
-
34748844384
-
Privacy-preserving collaborative association rule mining
-
University of Connecticut, Storrs, CT, U.S.A, Aug. 7-10
-
Z. Zhan, S. Matwin, and L. Chang, "Privacy-preserving collaborative association rule mining," In 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, University of Connecticut, Storrs, CT, U.S.A., Aug. 7-10, 2005.
-
(2005)
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Zhan, Z.1
Matwin, S.2
Chang, L.3
|