-
1
-
-
10044273842
-
Tools for privacy preserving data mining
-
Clifton, C, Kantarcioglu, M., Vaidya, J., Lin, X., and Zhu, M. Y. (2002). Tools for privacy preserving data mining. SIGKDD Explorations, 4(2):28-34.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
, pp. 28-34
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
Lin, X.4
Zhu, M.Y.5
-
2
-
-
84927517111
-
-
Du, W. and Atallah, M. (2001). Privacy-preserving cooperative statistical analysis. In Proc. of the 17th Annual Computer Security Applications Conference, pages 102-110.
-
Du, W. and Atallah, M. (2001). Privacy-preserving cooperative statistical analysis. In Proc. of the 17th Annual Computer Security Applications Conference, pages 102-110.
-
-
-
-
6
-
-
32344446366
-
-
Jagannathan, G. and Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceeding of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pages 593-599.
-
Jagannathan, G. and Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceeding of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pages 593-599.
-
-
-
-
7
-
-
33646017451
-
-
Jha, S., Kroger, L., and McDaniel, P. (2005). Privacy preserving clustering. In Proc. of the 10th European Symposium on Research in Computer Security, pages 397-417.
-
Jha, S., Kroger, L., and McDaniel, P. (2005). Privacy preserving clustering. In Proc. of the 10th European Symposium on Research in Computer Security, pages 397-417.
-
-
-
-
9
-
-
78149334786
-
-
Merugu, S. and Ghosh, J. (2003). Privacy-preserving distributed clustering using generative models. In Proc. of the 3rd IEEE International Conference on Data Mining, pages 211-218.
-
Merugu, S. and Ghosh, J. (2003). Privacy-preserving distributed clustering using generative models. In Proc. of the 3rd IEEE International Conference on Data Mining, pages 211-218.
-
-
-
-
10
-
-
64049119146
-
-
Naor, M. and Pinkas, B. (2001). Efficient oblivious transfer protocols. In Proc. of the 12th annual ACM-SIAM symposium on Discrete algorithms, pages 448-57.
-
Naor, M. and Pinkas, B. (2001). Efficient oblivious transfer protocols. In Proc. of the 12th annual ACM-SIAM symposium on Discrete algorithms, pages 448-57.
-
-
-
-
11
-
-
67649752861
-
-
Oliveira, S. R. M. and Zaiane, O. R. (2003). Privacy preserving clustering by data transformation. In Proc. of the 18th Brazilian Symposium on Databases), pages 304-318.
-
Oliveira, S. R. M. and Zaiane, O. R. (2003). Privacy preserving clustering by data transformation. In Proc. of the 18th Brazilian Symposium on Databases), pages 304-318.
-
-
-
-
12
-
-
67649749664
-
-
Peng, K., Boyd, C, Dawson, E., and Lee, B. (2004). An efficient and verifiable solution to the millionaire problem. In Proc. of the 7th International Conference on Information Security and Cryptology, pages 51-66.
-
Peng, K., Boyd, C, Dawson, E., and Lee, B. (2004). An efficient and verifiable solution to the millionaire problem. In Proc. of the 7th International Conference on Information Security and Cryptology, pages 51-66.
-
-
-
-
13
-
-
85047964398
-
Privacy preserving ID3 using Gini Index over horizontally partitioned data
-
Submitted
-
Samet, S. and Miri, A. (2006). Privacy preserving ID3 using Gini Index over horizontally partitioned data. Submitted.
-
(2006)
-
-
Samet, S.1
Miri, A.2
-
15
-
-
33745171439
-
Privacy preserving ID3 algorithm over horizontally partitioned data
-
Xiao, M.-J., Huang, L.-S., Luo, Y.-L., and Shen, H. (2005). Privacy preserving ID3 algorithm over horizontally partitioned data. In Parallel and Distributed Computing, Applications and Technologies, pages 239-243.
-
(2005)
In Parallel and Distributed Computing, Applications and Technologies
, pp. 239-243
-
-
Xiao, M.-J.1
Huang, L.-S.2
Luo, Y.-L.3
Shen, H.4
-
16
-
-
0020312165
-
-
Yao, A. C. (1982). Protocols for secure computations. In Proc. of the 23th Symposium on Foundations of Computer Science, pages 160-164.
-
Yao, A. C. (1982). Protocols for secure computations. In Proc. of the 23th Symposium on Foundations of Computer Science, pages 160-164.
-
-
-
-
17
-
-
0022882770
-
-
Yao, A. C. (1986). How to generate and exchange secrets. In Proc. of the 27th Symposium on Foundations of Computer Science, pages 162-167.
-
Yao, A. C. (1986). How to generate and exchange secrets. In Proc. of the 27th Symposium on Foundations of Computer Science, pages 162-167.
-
-
-
|