-
1
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile, Sept. 12-15, VLDB
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules. In Proceedings of the 20th International Conference on Very Large Data Bases, pages 487-499, Santiago, Chile, Sept. 12-15 1994. VLDB.
-
(1994)
Proceedings of the 20th International Conference on Very Large Data Bases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX, May 14-19, ACM
-
R. Agrawal and R. Srikant. Privacy-preserving data mining. In Proceedings of the 2000 ACM SIGMOD Conference on Management of Data, pages 439-450, Dallas, TX, May 14-19 2000. ACM.
-
(2000)
Proceedings of the 2000 ACM SIGMOD Conference on Management of Data
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
34548547007
-
Blocking anonymity threats raised by frequent itemset mining
-
IEEE Computer Society
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. Blocking anonymity threats raised by frequent itemset mining. In Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA, pages 561-564. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 27-30 November 2005, Houston, Texas, USA
, pp. 561-564
-
-
Atzori, M.1
Bonchi, F.2
Giannotti, F.3
Pedreschi, D.4
-
4
-
-
33646407813
-
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2005.
-
M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2005.
-
-
-
-
8
-
-
84878037002
-
-
A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2006.
-
A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2006.
-
-
-
-
9
-
-
26444451487
-
On secure scalar product computation for privacy-preserving data mining
-
C. Park and S. Chee, editors, Seoul, Korea, Dec. 2-3
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In C. Park and S. Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), Seoul, Korea, Dec. 2-3 2004.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
10
-
-
0003979335
-
-
chapter General Cryptographic Protocols. Cambridge University Press
-
O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
14
-
-
12244296735
-
When do data mining results violate privacy?
-
Seattle, WA, Aug. 22-25
-
M. Kantarcioglu, J. Jin, and C. Clifton. When do data mining results violate privacy? In Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 599-604, Seattle, WA, Aug. 22-25 2004.
-
(2004)
Proceedings of the 2004 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 599-604
-
-
Kantarcioglu, M.1
Jin, J.2
Clifton, C.3
-
15
-
-
29844444250
-
Incognito: Efficient full-domain k-anonymity
-
Baltimore, MD, June 13-16
-
K. LeFevre, D. DeWitt, and R. Ramakrishnan. Incognito: Efficient full-domain k-anonymity. In Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, Baltimore, MD, June 13-16 2005.
-
(2005)
Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data
-
-
LeFevre, K.1
DeWitt, D.2
Ramakrishnan, R.3
-
16
-
-
84974555530
-
Privacy preserving data mining
-
Springer-Verlag, Aug. 20-24
-
Y Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, pages 36-54. Springer-Verlag, Aug. 20-24 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, pp. 36-54
-
-
Lindell, Y.1
Pinkas, B.2
-
18
-
-
84956852274
-
A new public-key cryptosystem as secure as factoring
-
Advances in Cryptology, Eurocrypt '98, Springer-Verlag
-
T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology - Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
, pp. 308-318
-
-
Okamoto, T.1
Uchiyama, S.2
-
20
-
-
0031632776
-
Generalizing data to provide anonymity when disclosing information
-
abstract, New York, NY, USA, ACM Press
-
P. Samarati and L. Sweeney. Generalizing data to provide anonymity when disclosing information (abstract). In Proceedings of the seventeenth ACM SIGACT-SIGMODSIGART symposium on Principles of Database Systems (PODS), page 188, New York, NY, USA, 1998. ACM Press.
-
(1998)
Proceedings of the seventeenth ACM SIGACT-SIGMODSIGART symposium on Principles of Database Systems (PODS)
, pp. 188
-
-
Samarati, P.1
Sweeney, L.2
-
24
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
Nov
-
J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4):593-622, Nov. 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
26
-
-
34748844384
-
Privacy-preserving collaborative association rule mining
-
Storrs, Connecticut, Aug. 7-10
-
J. Zhan, S. Matwin, and L. Chang. Privacy-preserving collaborative association rule mining. In Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Database and Applications Security, Storrs, Connecticut, Aug. 7-10 2005.
-
(2005)
Proceedings of the 19th Annual IFIP WG 11.3 Working Conference on Database and Applications Security
-
-
Zhan, J.1
Matwin, S.2
Chang, L.3
|