-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
R. Agrawal and R. Srikant, "Fast Algorithms for Mining Association Rules," Proc. 20th Int'l Conf. Very large Data Bases, pp. 487-499, 1994, available: http://www.vldb.org/dblp/db/ conf/vldb/vldb94-487.html.
-
(1994)
Proc. 20th Int'l Conf. Very Large Data Bases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0030387678
-
A fast distributed algorithm for mining association rules
-
D.W.-L. Cheung, J. Han, V. Ng, A.W.-C. Fu, and Y. Fu, "A Fast Distributed Algorithm for Mining Association Rules," Proc. 1996 Int'l Conf. Parallel and Distributed Information Systems (PDIS '96), pp. 31-42, 1996.
-
(1996)
Proc. 1996 Int'l Conf. Parallel and Distributed Information Systems (PDIS '96)
, pp. 31-42
-
-
Cheung, D.W.-L.1
Han, J.2
Ng, V.3
Fu, A.W.-C.4
Fu, Y.5
-
3
-
-
0030379749
-
Efficient mining of association rules in distributed databases
-
Dec.
-
D.W.-L. Cheung, V. Ng, A.W.-C. Fu, and Y. Fu, "Efficient Mining of Association Rules in Distributed Databases," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 6, pp. 911-922, Dec. 1996.
-
(1996)
IEEE Trans. Knowledge and Data Eng.
, vol.8
, Issue.6
, pp. 911-922
-
-
Cheung, D.W.-L.1
Ng, V.2
Fu, A.W.-C.3
Fu, Y.4
-
6
-
-
0242625281
-
Privacy preserving mining of association rules
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, "Privacy Preserving Mining of Association Rules," Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 217-228, 2002, available: http://doi.acm.org/10.1145/775047.775080.
-
(2002)
Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 217-228
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
7
-
-
1142294784
-
Maintaining data privacy in association rule mining
-
S.J. Rizvi and J.R. Haritsa, "Maintaining Data Privacy in Association Rule Mining," Proc. 28th Int'l Conf. Very Large Data Bases, pp. 682-693, 2002, available: http://www.vldb.org/conf/ 2002/S19P03.pdf.
-
(2002)
Proc. 28th Int'l Conf. Very Large Data Bases
, pp. 682-693
-
-
Rizvi, S.J.1
Haritsa, J.R.2
-
8
-
-
84974555530
-
Privacy preserving data mining
-
Y. Lindell and B. Pinkas, "Privacy Preserving Data Mining," Advances in Cryptology (CRYPTO 2000), pp. 36-54, 2000, available: http://link.springer.de/link/service/series/0558/bibs/1880/ 18800036.htm.
-
(2000)
Advances in Cryptology (CRYPTO 2000)
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
9
-
-
0003839182
-
Secure multiparty computation
-
Sept.
-
O. Goldreich, "Secure Multiparty Computation," (working draft), Sept. 1998, available: http://www.wisdom.weizmann.ac.il/~oded/pp.html.
-
(1998)
Working Draft
-
-
Goldreich, O.1
-
13
-
-
84862427089
-
Encryption schemes
-
Mar.
-
O. Goldreich, "Encryption Schemes," (working draft), Mar. 2003, available: http://www.wisdom.weizmann.ac.il/~oded/PSBook Frag/enc.ps.
-
(2003)
Working Draft
-
-
Goldreich, O.1
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978, available: http://doi.acm.org/ 10.1145/359340.359342.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S.C. Pohlig and M.E. Hellman, "An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance," IEEE Trans. Information Theory, vol. IT-24, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
16
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Nov.
-
M.K. Reiter and A.D. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, Nov. 1998, available: http://doi.acm.org/ 10.1145/290163.290168.
-
(1998)
ACM Trans. Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
17
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret
-
A. Odlyzko, ed.
-
J.C. Benaloh, "Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret," Advances in Cryptography (CKYPTO86): Proc., A. Odlyzko, ed., pp. 251-260, 1986, available: http://spring erlink.metapress.com/openurl. asp?genre=article&issn=0302-9%743&volume=263&spage=251.
-
(1986)
Advances in Cryptography (CKYPTO86): Proc.
, pp. 251-260
-
-
Benaloh, J.C.1
-
18
-
-
0040655149
-
A communication-privacy tradeoff for modular addition
-
B. Chor and E. Kushilevitz, "A Communication-Privacy Tradeoff for Modular Addition," Information Processing Letters, vol. 45, no. 4, pp. 205-210, 1993.
-
(1993)
Information Processing Letters
, vol.45
, Issue.4
, pp. 205-210
-
-
Chor, B.1
Kushilevitz, E.2
-
19
-
-
26444575051
-
Defining privacy for data mining
-
H. Kargupta, A. Joshi, and K. Sivakumar, eds.
-
C. Clifton, M. Kantarcioglu, and J. Vaidya, "Defining Privacy for Data Mining," Proc. US Nat'l Science Foundation Workshop on Next Generation Data Mining, H. Kargupta, A. Joshi, and K. Sivakumar, eds., pp. 126-133, 2002.
-
(2002)
Proc. US Nat'l Science Foundation Workshop on next Generation Data Mining
, pp. 126-133
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
20
-
-
84883891962
-
Enhancing privacy and trust in electronic communities
-
B.A. Huberman, M. Franklin, and T. Hogg, "Enhancing Privacy and Trust in Electronic Communities," Proc. First ACM Conf. Electronic Commerce (EC '99), pp. 78-86, 1999.
-
(1999)
Proc. First ACM Conf. Electronic Commerce (EC '99)
, pp. 78-86
-
-
Huberman, B.A.1
Franklin, M.2
Hogg, T.3
-
21
-
-
85012908743
-
One-way accumulators: A decentralized alternative to digital signatures
-
J.C. Benaloh and M. de Mare, "One-Way Accumulators: A Decentralized Alternative to Digital Signatures," Advances in Cryptology - EUROCRYPT '93, Workshop Theory and Application of Cryptographic Techniques, pp. 274-285, 1993, available: http://springerlink.metapress.com/openurl.asp?genre=artcle&issn= 0302-9%743&volume=765&spage=274.
-
(1993)
Advances in Cryptology - EUROCRYPT '93, Workshop Theory and Application of Cryptographic Techniques
, pp. 274-285
-
-
Benaloh, J.C.1
De Mare, M.2
-
22
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
23
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. IT-31, no. 4, pp. 469-472, July 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
24
-
-
4544336448
-
Mental poker
-
Laboratory for Computer Science, MIT, Feb.
-
A. Shamir, R.L. Rivest, and L.M. Adleman, "Mental Poker," Technical Memo MIT-LCS-TM-125, Laboratory for Computer Science, MIT, Feb. 1979.
-
(1979)
Technical Memo
, vol.MIT-LCS-TM-125
-
-
Shamir, A.1
Rivest, R.L.2
Adleman, L.M.3
|