메뉴 건너뛰기




Volumn 5927 LNCS, Issue , 2009, Pages 359-369

Collusion-resistant protocol for privacy-preserving distributed association rules mining

Author keywords

Association rules mining; Collusion; Privacy; Security

Indexed keywords

ASSOCIATION RULE MINING; ASSOCIATION RULES MINING; DATA MINING TECHNIQUES; HOMOMORPHIC-ENCRYPTIONS; PRIVACY PRESERVING; PRIVACY-PRESERVING DATA MINING; PROBLEM OF PRIVACY; VERTICALLY PARTITIONED DATA;

EID: 76549090800     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11145-7_28     Document Type: Conference Paper
Times cited : (2)

References (19)
  • 6
    • 76549131385 scopus 로고
    • Foundations of cryptography, Class notes
    • Spring
    • Goldreich,O.: Foundations of cryptography, Class notes, Technion University (Spring 1989)
    • (1989) Technion University
    • Goldreich, O.1
  • 8
    • 71149116146 scopus 로고
    • Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
    • Goldreich, O., Micali, S.,Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM 38, 691-729 (1991)
    • (1991) J. ACM , vol.38 , pp. 691-729
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 10
    • 33746437508 scopus 로고    scopus 로고
    • Privacy Preserving Data Mining
    • Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. Journal of Cryptology 15(3), 177-206 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 12
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 13
    • 4544312695 scopus 로고    scopus 로고
    • Cryptographic techniques for privacy preserving Data mining
    • Pinkas, B.: Cryptographic techniques for privacy preserving Data mining. SIGKDD Explorations 4(2), 12-19 (2002)
    • (2002) SIGKDD Explorations , vol.4 , Issue.2 , pp. 12-19
    • Pinkas, B.1
  • 14
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • De Millo, R.A, et al, eds, Academic Press, London
    • Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: De Millo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169-179. Academic Press, London (1978)
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.1    Adleman, L.2    Dertouzos, M.3
  • 15
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22, 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.