메뉴 건너뛰기




Volumn , Issue , 2007, Pages 381-385

Privacy preserving &-means clustering in multi-party environment

Author keywords

Classification and association rules; Clustering; Data mining; Distributed data structures; Mining methods and algorithms; Security and privacy protection

Indexed keywords

CLASSIFICATION AND ASSOCIATION RULES; CLUSTERING; DISTRIBUTED DATA STRUCTURES; MINING METHODS AND ALGORITHMS; SECURITY AND PRIVACY PROTECTION;

EID: 67649816020     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (17)
  • 2
    • 84927517111 scopus 로고    scopus 로고
    • Du, W. and Atallah, M. (2001). Privacy-preserving cooperative statistical analysis. In Proc. of the 17th Annual Computer Security Applications Conference, pages 102-110.
    • Du, W. and Atallah, M. (2001). Privacy-preserving cooperative statistical analysis. In Proc. of the 17th Annual Computer Security Applications Conference, pages 102-110.
  • 6
    • 32344446366 scopus 로고    scopus 로고
    • Jagannathan, G. and Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceeding of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pages 593-599.
    • Jagannathan, G. and Wright, R. N. (2005). Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In Proceeding of the 11th ACM SIGKDD international conference on Knowledge discovery in data mining, pages 593-599.
  • 7
    • 33646017451 scopus 로고    scopus 로고
    • Jha, S., Kroger, L., and McDaniel, P. (2005). Privacy preserving clustering. In Proc. of the 10th European Symposium on Research in Computer Security, pages 397-417.
    • Jha, S., Kroger, L., and McDaniel, P. (2005). Privacy preserving clustering. In Proc. of the 10th European Symposium on Research in Computer Security, pages 397-417.
  • 9
    • 78149334786 scopus 로고    scopus 로고
    • Merugu, S. and Ghosh, J. (2003). Privacy-preserving distributed clustering using generative models. In Proc. of the 3rd IEEE International Conference on Data Mining, pages 211-218.
    • Merugu, S. and Ghosh, J. (2003). Privacy-preserving distributed clustering using generative models. In Proc. of the 3rd IEEE International Conference on Data Mining, pages 211-218.
  • 10
    • 64049119146 scopus 로고    scopus 로고
    • Naor, M. and Pinkas, B. (2001). Efficient oblivious transfer protocols. In Proc. of the 12th annual ACM-SIAM symposium on Discrete algorithms, pages 448-57.
    • Naor, M. and Pinkas, B. (2001). Efficient oblivious transfer protocols. In Proc. of the 12th annual ACM-SIAM symposium on Discrete algorithms, pages 448-57.
  • 11
    • 67649752861 scopus 로고    scopus 로고
    • Oliveira, S. R. M. and Zaiane, O. R. (2003). Privacy preserving clustering by data transformation. In Proc. of the 18th Brazilian Symposium on Databases), pages 304-318.
    • Oliveira, S. R. M. and Zaiane, O. R. (2003). Privacy preserving clustering by data transformation. In Proc. of the 18th Brazilian Symposium on Databases), pages 304-318.
  • 12
    • 67649749664 scopus 로고    scopus 로고
    • Peng, K., Boyd, C, Dawson, E., and Lee, B. (2004). An efficient and verifiable solution to the millionaire problem. In Proc. of the 7th International Conference on Information Security and Cryptology, pages 51-66.
    • Peng, K., Boyd, C, Dawson, E., and Lee, B. (2004). An efficient and verifiable solution to the millionaire problem. In Proc. of the 7th International Conference on Information Security and Cryptology, pages 51-66.
  • 13
    • 85047964398 scopus 로고    scopus 로고
    • Privacy preserving ID3 using Gini Index over horizontally partitioned data
    • Submitted
    • Samet, S. and Miri, A. (2006). Privacy preserving ID3 using Gini Index over horizontally partitioned data. Submitted.
    • (2006)
    • Samet, S.1    Miri, A.2
  • 16
    • 0020312165 scopus 로고    scopus 로고
    • Yao, A. C. (1982). Protocols for secure computations. In Proc. of the 23th Symposium on Foundations of Computer Science, pages 160-164.
    • Yao, A. C. (1982). Protocols for secure computations. In Proc. of the 23th Symposium on Foundations of Computer Science, pages 160-164.
  • 17
    • 0022882770 scopus 로고    scopus 로고
    • Yao, A. C. (1986). How to generate and exchange secrets. In Proc. of the 27th Symposium on Foundations of Computer Science, pages 162-167.
    • Yao, A. C. (1986). How to generate and exchange secrets. In Proc. of the 27th Symposium on Foundations of Computer Science, pages 162-167.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.