메뉴 건너뛰기




Volumn 3, Issue 2, 2008, Pages 31-41

Privacy-preserving collaborative data mining

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); DATA MINING; DATA PRIVACY; PROBLEM SOLVING;

EID: 42949124901     PISSN: 1556603X     EISSN: None     Source Type: Journal    
DOI: 10.1109/MCI.2008.919071     Document Type: Article
Times cited : (19)

References (26)
  • 3
    • 0022145479 scopus 로고
    • Security without identification
    • Oct
    • D. Chaum, "Security without identification," In Communication of the ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985.
    • (1985) Communication of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 7
  • 10
    • 0003642109 scopus 로고    scopus 로고
    • Boosting and naive bayesian learning
    • Technical Report CS97-557, University of California, San Diego
    • C. Elkan, Boosting and naive bayesian learning. Technical Report CS97-557, University of California, San Diego, 1997.
    • (1997)
    • Elkan, C.1
  • 11
    • 42949146327 scopus 로고    scopus 로고
    • Epic, Privacy and human rights an international survey of privacy laws and developments. Electronic Privacy Information Center, www.epic.org, May, 2003.
    • Epic, "Privacy and human rights an international survey of privacy laws and developments. Electronic Privacy Information Center, www.epic.org, May, 2003.
  • 19
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Prague, Czech Republic
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," In Advances in Cryptography-EUROCRYPT'99, pp. 223-238, Prague, Czech Republic, 1999.
    • (1999) Advances in Cryptography-EUROCRYPT'99 , pp. 223-238
    • Paillier, P.1
  • 20
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • eds. R. A. DeMillo et al, Academic Press, pp
    • R. Rivest, L. Adleman, and M. Dertouzos, "On data banks and privacy homomorphisms," In Foundations of Secure Computation, eds. R. A. DeMillo et al., Academic Press, pp. 169-179, 1978.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.