-
1
-
-
0034827009
-
On the design and quantification of privacy preserving data mining algorithms
-
Santa Barbara, CA. ACM Press, New York
-
AGRAWAL, D. AND AGGARWAL, C. C. 2001. On the design and quantification of privacy preserving data mining algorithms. In Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA. ACM Press, New York, 247-255.
-
(2001)
Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 247-255
-
-
AGRAWAL, D.1
AGGARWAL, C.C.2
-
2
-
-
55149108919
-
-
AGRAWAL, R., EVFIMIEVSKI, A., AND SRIKANT, R. 2008. Information sharing across private databases. In Proceedings of the ACM SIGMOD InternationalConference on Management of Data, San Diego, CA. ACM Press, New York.
-
AGRAWAL, R., EVFIMIEVSKI, A., AND SRIKANT, R. 2008. Information sharing across private databases. In Proceedings of the ACM SIGMOD InternationalConference on Management of Data, San Diego, CA. ACM Press, New York.
-
-
-
-
3
-
-
0041783510
-
Privacy-Preserving data mining
-
Dallas, TX. ACM Press, New York
-
AGRAWAL, R. AND SRIKANT, R. 2000. Privacy-Preserving data mining. In Proceedings of the ACM SIGMOD Conference on Management of Data, Dallas, TX. ACM Press, New York, 439-450.
-
(2000)
Proceedings of the ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
AGRAWAL, R.1
SRIKANT, R.2
-
4
-
-
77954694081
-
Secure supply-chain protocols
-
Newport Beach, CA. IEEE Computer Society Press
-
ATALLAH, M. J., ELMONGUI, H. G., DESHPANDE, V., AND SCHWARZ, L. B. 2003. Secure supply-chain protocols. In Proceedings of the IEEE International Conference on E-Commerce, Newport Beach, CA. IEEE Computer Society Press, 293-302.
-
(2003)
Proceedings of the IEEE International Conference on E-Commerce
, pp. 293-302
-
-
ATALLAH, M.J.1
ELMONGUI, H.G.2
DESHPANDE, V.3
SCHWARZ, L.B.4
-
6
-
-
84947743704
-
Efficient elliptic curve exponentiation using mixed coordinates
-
Springer-Verlag, London, UK
-
COHEN, H., MIYAJI, A., AND ONO, T. 1998. Efficient elliptic curve exponentiation using mixed coordinates. In Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT). Springer-Verlag, London, UK, 51-65.
-
(1998)
Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT)
, pp. 51-65
-
-
COHEN, H.1
MIYAJI, A.2
ONO, T.3
-
7
-
-
55149086910
-
-
COX, M. J., ENGELSCHALL, R. S., HENSON, S., AND RIE, B. L. 1998-2005. The OpenSSL Toolkit.
-
(1998)
The OpenSSL Toolkit
-
-
COX, M.J.1
ENGELSCHALL, R.S.2
HENSON, S.3
RIE, B.L.4
-
8
-
-
84945124606
-
-
CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. 2001. Multiparty computation from threshold homomorphic encryption. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, London, UK, 280-299.
-
CRAMER, R., DAMGARD, I., AND NIELSEN, J. B. 2001. Multiparty computation from threshold homomorphic encryption. In Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques (EUROCRYPT). Springer-Verlag, London, UK, 280-299.
-
-
-
-
10
-
-
0242496951
-
Secure multi-party computation problems and their applications: A review and open problems
-
ACM, New York
-
DU, W. AND ATALLAH, M. J. 2001. Secure multi-party computation problems and their applications: A review and open problems. In Proceedings of the New Security Paradigms Workshop. ACM, New York, 11-20.
-
(2001)
Proceedings of the New Security Paradigms Workshop
, pp. 11-20
-
-
DU, W.1
ATALLAH, M.J.2
-
11
-
-
1642302606
-
Building decision tree classifier on private data
-
Maebashi City, Japan, C. Clifton and V. Estivill-Castro, Eds. Australian Computer Society
-
DU, W. AND ZHAN, Z. 2002. Building decision tree classifier on private data. In Proceedings of the IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, C. Clifton and V. Estivill-Castro, Eds. vol. 14. Australian Computer Society, 1-8.
-
(2002)
Proceedings of the IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 1-8
-
-
DU, W.1
ZHAN, Z.2
-
13
-
-
0242625281
-
Privacy preserving mining of association rules
-
ACM, New York
-
EVFIMIEVSKI, A., SRIKANT, R., AGRAWAL, R., AND GEHRKE, J. 2002. Privacy preserving mining of association rules. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, New York, 217-228.
-
(2002)
Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 217-228
-
-
EVFIMIEVSKI, A.1
SRIKANT, R.2
AGRAWAL, R.3
GEHRKE, J.4
-
14
-
-
0026775637
-
-
EVIDENCE-BASED MEDICINE WORKING GROUP. 1992. Evidence-Based medicine. A new approach to teaching the practice of medicine. J. Amer. Medical Assoc. 268, 17 (Nov.), 2420-2425.
-
EVIDENCE-BASED MEDICINE WORKING GROUP. 1992. Evidence-Based medicine. A new approach to teaching the practice of medicine. J. Amer. Medical Assoc. 268, 17 (Nov.), 2420-2425.
-
-
-
-
15
-
-
35048820609
-
-
FREEDMAN, M. J., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersec-tion. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, International Association for Cryptologic Research (IACR), Interlaken, Switzerland. Springer, 1-19.
-
FREEDMAN, M. J., NISSIM, K., AND PINKAS, B. 2004. Efficient private matching and set intersec-tion. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, International Association for Cryptologic Research (IACR), Interlaken, Switzerland. Springer, 1-19.
-
-
-
-
16
-
-
24944523186
-
-
GOETHALS, B., LAUR, S., LIPMAA, H., AND MIELIKÄINEN, T. 2004. On secure scalar product computation for privacy-preserving data mining. In Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC), New York, C. Park and S. Chee, Eds. 3506, Springer, 104-120.
-
GOETHALS, B., LAUR, S., LIPMAA, H., AND MIELIKÄINEN, T. 2004. On secure scalar product computation for privacy-preserving data mining. In Proceedings of the 7th Annual International Conference in Information Security and Cryptology (ICISC), New York, C. Park and S. Chee, Eds. vol. 3506, Springer, 104-120.
-
-
-
-
17
-
-
26444497804
-
General Cryptographic Protocols
-
2. Cambridge University Press, Cambridge, UK
-
GOLDREICH, O. 2004. General Cryptographic Protocols, Vol. 2. In The Foundations of Cryptography, vol. 2. Cambridge University Press, Cambridge, UK, 599-764.
-
(2004)
In The Foundations of Cryptography
, vol.2
, pp. 599-764
-
-
GOLDREICH, O.1
-
18
-
-
0023545076
-
How to play any mental game - A completeness theorem for protocols with honest majority
-
ACM, New York
-
GOLDREICH, O., MICALI, S., AND WIGDERSON, A. 1987. How to play any mental game - A completeness theorem for protocols with honest majority. In Proceedings of the 19th ACM Symposium on the Tfieory of Computing. ACM, New York, 218-229.
-
(1987)
Proceedings of the 19th ACM Symposium on the Tfieory of Computing
, pp. 218-229
-
-
GOLDREICH, O.1
MICALI, S.2
WIGDERSON, A.3
-
19
-
-
29844458622
-
Deriving private information from randomized data
-
Baltimore, MD. ACM Press, New York
-
HUANG, Z., DU, W., AND CHEN, B. 2005. Deriving private information from randomized data. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Baltimore, MD. ACM Press, New York.
-
(2005)
Proceedings of the ACM SIGMOD International Conference on Management of Data
-
-
HUANG, Z.1
DU, W.2
CHEN, B.3
-
20
-
-
32344446366
-
Privacy-Preserving distributed k-means clustering over arbitrarily partitioned data
-
Chicago, IL. ACM Press, New York
-
JAGANNATHAN, G. AND WRIGHT, R. N. 2005. Privacy-Preserving distributed k-means clustering over arbitrarily partitioned data. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL. ACM Press, New York, 593-599.
-
(2005)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 593-599
-
-
JAGANNATHAN, G.1
WRIGHT, R.N.2
-
21
-
-
55149097566
-
-
KANTARCIOGLU, M. AND CLIFTON, C. 2002. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. In Praceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD), Madison, WI. ACM Press, New York, 24-31.
-
KANTARCIOGLU, M. AND CLIFTON, C. 2002. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. In Praceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (DMKD), Madison, WI. ACM Press, New York, 24-31.
-
-
-
-
22
-
-
1642335029
-
An architecture for privacy-preserving mining of client information
-
Maebashi City, Japan, C. Clifton and V. Estivill-Castro, Eds. Australian Computer Society
-
KANTARCIOGLU, M. AND VAIDYA, J. 2002. An architecture for privacy-preserving mining of client information. In Proceedings of the IEEE International Conference on Data Mining, Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, C. Clifton and V. Estivill-Castro, Eds. vol. 14. Australian Computer Society, 37-42.
-
(2002)
Proceedings of the IEEE International Conference on Data Mining, Workshop on Privacy, Security, and Data Mining
, vol.14
, pp. 37-42
-
-
KANTARCIOGLU, M.1
VAIDYA, J.2
-
23
-
-
4544361334
-
-
KANTARCIOǦLU, M. AND CLIFTON, C. 2004. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 9 (Sept.), 1026-1037.
-
KANTARCIOǦLU, M. AND CLIFTON, C. 2004. Privacy-Preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16, 9 (Sept.), 1026-1037.
-
-
-
-
24
-
-
78149340011
-
On the privacy preserving properties of random data perturbation techniques
-
IEEE Computer Society, Los Alamitos, CA
-
KARGUPTA, H., DATTA, S., WANG, Q., AND SIVAKUMAR, K. 2003. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM). IEEE Computer Society, Los Alamitos, CA.
-
(2003)
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM)
-
-
KARGUPTA, H.1
DATTA, S.2
WANG, Q.3
SIVAKUMAR, K.4
-
25
-
-
55149121505
-
-
LEWIS, M. 2003. Department of defense appropriations act, 2004. Title VIII Section 8120. Enacted as Public Law 108-87.
-
LEWIS, M. 2003. Department of defense appropriations act, 2004. Title VIII Section 8120. Enacted as Public Law 108-87.
-
-
-
-
26
-
-
19744365747
-
-
LIN, X., CLIFTON, C., AND ZHU, M. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8, 1 (Jul.), 68-81.
-
LIN, X., CLIFTON, C., AND ZHU, M. 2005. Privacy preserving clustering with distributed EM mixture modeling. Knowl. Inf. Syst. 8, 1 (Jul.), 68-81.
-
-
-
-
27
-
-
84974555530
-
Privacy preserving data mining
-
Springer-Verlag, New York, NY
-
LINDELL, Y. AND PINKAS, B. 2000. Privacy preserving data mining. In Advances in Cryptology (CRYPTO). Springer-Verlag, New York, NY, 36-54.
-
(2000)
Advances in Cryptology (CRYPTO)
, pp. 36-54
-
-
LINDELL, Y.1
PINKAS, B.2
-
28
-
-
33746437508
-
Privacy preserving data mining
-
LINDELL, Y. AND PINKAS, B. 2002. Privacy preserving data mining. J. Cryptol. 15, 3, 177-206.
-
(2002)
J. Cryptol
, vol.15
, Issue.3
, pp. 177-206
-
-
LINDELL, Y.1
PINKAS, B.2
-
29
-
-
33744584654
-
Induction of decision trees
-
QUINLAN, J. R. 1986. Induction of decision trees. Mach. Learn. 1, 1, 81-106.
-
(1986)
Mach. Learn
, vol.1
, Issue.1
, pp. 81-106
-
-
QUINLAN, J.R.1
-
31
-
-
0003855464
-
-
2nd ed. John Wiley & Sons, Hoboken, NJ
-
SCHNEIER, B. 1995. Applied Cryptography, 2nd ed. John Wiley & Sons, Hoboken, NJ.
-
(1995)
Applied Cryptography
-
-
SCHNEIER, B.1
-
32
-
-
4444243813
-
-
SHIRAO, K., HOFF, P., OHTSU, A., LOEHRER, P., HYODO, I., WADLER, S., WADLEIGH, R., O'DWYER, P., MURO, K., YAMADA, Y., BOKU, N., NAGASHIMA, F., AND ABBRUZZESE, J. 2004. Comparison of the efficacy, toxicity, and pharmacokinetics of a uracil/tegafur (UFT) plus oral leucovorin (LV) regimen between Japanese and American patients with advanced colorectal cancer: Joint United States and Japan study of UFT/LV. J. Clinical Oncol. 22, 17 (Sept. 1), 3466-3474.
-
SHIRAO, K., HOFF, P., OHTSU, A., LOEHRER, P., HYODO, I., WADLER, S., WADLEIGH, R., O'DWYER, P., MURO, K., YAMADA, Y., BOKU, N., NAGASHIMA, F., AND ABBRUZZESE, J. 2004. Comparison of the efficacy, toxicity, and pharmacokinetics of a uracil/tegafur (UFT) plus oral leucovorin (LV) regimen between Japanese and American patients with advanced colorectal cancer: Joint United States and Japan study of UFT/LV. J. Clinical Oncol. 22, 17 (Sept. 1), 3466-3474.
-
-
-
-
33
-
-
0242709355
-
Privacy-Preserving association rule mining in vertically partitioned data
-
Edmonton, Alberta, Canada. ACM Press, New York
-
VAIDYA, J. AND CLIFTON, C. 2002. Privacy-Preserving association rule mining in vertically partitioned data. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada. ACM Press, New York, 639-644.
-
(2002)
Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 639-644
-
-
VAIDYA, J.1
CLIFTON, C.2
-
34
-
-
77952332120
-
Privacy-preserving k -means clustering over vertically partitioned data
-
Washington, DC. ACM Press, New York
-
VAIDYA, J. AND CLIFTON, C. 2003. Privacy-preserving k -means clustering over vertically partitioned data. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC. ACM Press, New York, 206-215.
-
(2003)
Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 206-215
-
-
VAIDYA, J.1
CLIFTON, C.2
-
35
-
-
2942536415
-
-
VAIDYA, J. AND CLIFTON, C. 2004. Privacy preserving naïve Bayes classifier for vertically partitioned data. In Proceedings of the SIAM International Conference on Data Mining, SIAM, Philadelphia, PA, 522-526.
-
VAIDYA, J. AND CLIFTON, C. 2004. Privacy preserving naïve Bayes classifier for vertically partitioned data. In Proceedings of the SIAM International Conference on Data Mining, SIAM, Philadelphia, PA, 522-526.
-
-
-
-
37
-
-
10944227231
-
-
VAIDYA, J. AND CLIFTON, C. 2005b. Secure set intersection cardinality with application to association rule mining. J. Comput. Security 13, 4 (Nov.), 593-622.
-
VAIDYA, J. AND CLIFTON, C. 2005b. Secure set intersection cardinality with application to association rule mining. J. Comput. Security 13, 4 (Nov.), 593-622.
-
-
-
-
38
-
-
33750699978
-
Classification spanning private databases
-
AAAI Press, Menlo Park, CA
-
WANG, K., XU, Y., SHE, R., AND YU, P. S. 2006. Classification spanning private databases. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI). AAAI Press, Menlo Park, CA.
-
(2006)
Proceedings of the 21st National Conference on Artificial Intelligence (AAAI)
-
-
WANG, K.1
XU, Y.2
SHE, R.3
YU, P.S.4
|