메뉴 건너뛰기




Volumn , Issue , 2010, Pages 483-492

Collusion-resistant privacy-preserving data mining

Author keywords

Collusion; Data mining; Distributed; Privacy; Secure multiparty computation

Indexed keywords

COLLUSION; DISTRIBUTED; GENERAL METHOD; MULTIPARTY SECURE COMPUTATION; PERSONAL INFORMATION; PRIVACY; PRIVACY PRESERVING DATA MINING; PRIVATE INFORMATION; RUNNING TIME; SECURE MULTI-PARTY COMPUTATION; SENSITIVE INFORMATIONS;

EID: 77956200067     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1835804.1835867     Document Type: Conference Paper
Times cited : (26)

References (30)
  • 4
    • 0026845445 scopus 로고
    • The euclidean definition of the functions div and mod
    • (April) (ACM Press (New York, NY, USA)) doi:10.1145/128861.128862
    • Raymond T. Boute, (April 1992). "The Euclidean definition of the functions div and mod". ACM Transactions on Programming Languages and Systems (TOPLAS) (ACM Press (New York, NY, USA)) 14 (2): 127-144. doi:10.1145/128861.128862
    • (1992) ACM Transactions on Programming Languages and Systems (TOPLAS) , vol.14 , Issue.2 , pp. 127-144
    • Boute, R.T.1
  • 8
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • I. Damgård, M. Jurik: A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Public Key Cryptography 2001: 119-136.
    • (2001) Public Key Cryptography , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 9
    • 38049173951 scopus 로고    scopus 로고
    • On secure multi-party computation in black-box groups
    • Menezes, A. (ed.) LNCS Springer, Heidelberg
    • Y. Desmedt, J. Pieprzyk, R. Steinfeld, H. Wang: On secure multi-party computation in black-box groups. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 591-612. Springer, Heidelberg (2007)
    • (2007) CRYPTO 2007 , vol.4622 , pp. 591-612
    • Desmedt, Y.1    Pieprzyk, J.2    Steinfeld, R.3    Wang, H.4
  • 10
    • 84874800178 scopus 로고
    • Cryptosystem and a signature scheme based on discrete logarithms
    • or CRYPTO 84, pp10-18, Springer-Verlag
    • T. ElGamal, A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory, v. IT-31, n. 4, 1985, pp469-472 or CRYPTO 84, pp10-18, Springer-Verlag.
    • (1985) IEEE Transactions on Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1    Public-Key, A.2
  • 18
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag, Aug. 20-24
    • Y. Lindell, B. Pinkas: Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, pages 36-54. Springer-Verlag, Aug. 20-24 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 20
    • 85032068914 scopus 로고
    • One-factorizations of the complete graph - A survey
    • E. Mendelsohn and A. Rosa, One-factorizations of the complete graph - a survey, J. Graph Theory 9 (1985), pp. 43-65.
    • (1985) J. Graph Theory , vol.9 , pp. 43-65
    • Mendelsohn, E.1    Rosa, A.2
  • 21
    • 0032218237 scopus 로고    scopus 로고
    • A new public key cryptosystem based on higher residues
    • ACM press
    • D. Naccache and J. Stern. A New Public Key Cryptosystem Based on Higher Residues. In Proc. of the 5th CCCS. ACM press, 199.
    • (1999) Proc. of the 5th CCCS
    • Naccache, D.1    Stern, J.2
  • 22
    • 84956852274 scopus 로고    scopus 로고
    • A new public key cryptosystem as secure as factoring
    • Springer-Verlag
    • T. Okamoto and S. Uchiyama. A New Public Key Cryptosystem as Secure as Factoring. In Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
    • (1998) Eurocrypt '98, LNCS 1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 24
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residue classes
    • Springer Verlag LNCS series
    • P. Paillier, Public-Key Cryptosystems based on Composite Degree Residue Classes, Proceedings of EuroCrypt 99, Springer Verlag LNCS series, 1998, pp. 223-238.
    • (1998) Proceedings of EuroCrypt 99 , pp. 223-238
    • Paillier, P.1
  • 25
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • doi:10.1145/359340.359342
    • R. Rivest, A. Shamir; L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21 (2): 120-126. doi:10.1145/359340.359342 (1978).
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 28
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • July
    • J. Vaidya, C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, v. 13 n. 4, p. 593-622, July 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 29
    • 45749132089 scopus 로고    scopus 로고
    • Privacy-preserving naïve bayes classification
    • J. Vaidya, M. Kantarcioglu, C. Clifton: Privacy-preserving Naïve Bayes classification, The VLDB Journal (2008), pp. 17:879-898.
    • (2008) The VLDB Journal , vol.17 , pp. 879-898
    • Vaidya, J.1    Kantarcioglu, M.2    Clifton, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.