메뉴 건너뛰기




Volumn , Issue , 2007, Pages 486-497

Secure two-party k-means clustering

Author keywords

K means clus tering; SecureMultiparty computation

Indexed keywords

DATABASE CLUSTERING; HOMOMORPHIC-ENCRYPTIONS; K-MEANS; K-MEANS CLUSTERING; MULTIPLE ITERATIONS; RANDOM SAMPLING; RANDOM VALUES; SECURE COMPUTATION;

EID: 74049103179     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315306     Document Type: Conference Paper
Times cited : (193)

References (27)
  • 5
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multiparty cryptographic protocols
    • R. Canetti. "Security and Composition of Multiparty Cryptographic Protocols." J. of Cryptology, Vol. 13 No. 1 pp. 143-202. 2000.
    • (2000) J. of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 8
    • 35048856104 scopus 로고    scopus 로고
    • Privacy-Preserving datamining on vertically partitioned data-bases
    • C. Dwork and K. Nissim. "Privacy-Preserving Datamining on Vertically Partitioned Data-bases." CRYPTO '04, LNCS 3152, pp. 528-544. 2004.
    • (2004) CRYPTO '04, LNCS 3152 , pp. 528-544
    • Dwork, C.1    Nissim, K.2
  • 9
    • 24944523186 scopus 로고    scopus 로고
    • On private scalar product computation for privacy-preserving data mining
    • B. Goethals, S. Laur, H. Lipmaa and T. Mielikäinen. "On Private Scalar Product Computation for Privacy-Preserving Data Mining." ICISC, LNCS 3506, pp. 104-120. 2004.
    • (2004) ICISC, LNCS 3506 , pp. 104-120
    • Goethals, B.1    Laur, S.2    Lipmaa, H.3    Mielikäinen, T.4
  • 13
    • 32344446366 scopus 로고    scopus 로고
    • Privacy-Preserving distributed k-means clustering over arbitrarily partitioned data
    • G. Jagannathan and R. Wright. "Privacy-Preserving Distributed k-Means Clustering over Arbitrarily Partitioned Data." KDD '05, pp. 593-599. 2005.
    • (2005) KDD '05 , pp. 593-599
    • Jagannathan, G.1    Wright, R.2
  • 15
    • 24144477856 scopus 로고    scopus 로고
    • Secure computation of the mean and related statistics
    • E. Kiltz, G. Leander and J. Malone-Lee. "Secure Computation of the Mean and Related Statistics." TCC '05, LNCS 3378, pp. 283-302. 2005.
    • (2005) TCC '05, LNCS 3378 , pp. 283-302
    • Kiltz, E.1    Leander, G.2    Malone-Lee, J.3
  • 19
    • 35348899361 scopus 로고    scopus 로고
    • The effectiveness of lloyd-type methods for the K-means problem
    • R. Ostrovsky, Y. Rabani, L. Schulman, and C. Swamy. "The Effectiveness of Lloyd-Type Methods for the k-Means Problem." FOCS. 2006.
    • (2006) FOCS
    • Ostrovsky, R.1    Rabani, Y.2    Schulman, L.3    Swamy, C.4
  • 20
    • 33750199090 scopus 로고    scopus 로고
    • Oblivious polynomial evaluation
    • M. Naor and B. Pinkas. "Oblivious Polynomial Evaluation. " SIAM J. of Computing, Vol. 35 No. 5, pp. 1254-1281. 2006.
    • (2006) SIAM J. of Computing , vol.35 , Issue.5 , pp. 1254-1281
    • Naor, M.1    Pinkas, B.2
  • 22
    • 0025508206 scopus 로고
    • Optimal size integer division circuits
    • J. Reif and S. Tate. "Optimal Size Integer Division Circuits." SIAM J. on Computing, pp. 912-924. 1990.
    • (1990) SIAM J. on Computing , pp. 912-924
    • Reif, J.1    Tate, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.