메뉴 건너뛰기




Volumn , Issue , 2006, Pages 319-329

Secure distributed k-anonymous pattern mining

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC SECURE MULTI PARTY COMPUTATION PROTOCOLS; ANONYMITY; DISTRIBUTED ENVIROMENTS; PATTERN MINING;

EID: 79955039516     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDM.2006.140     Document Type: Conference Paper
Times cited : (9)

References (26)
  • 4
    • 33646407813 scopus 로고    scopus 로고
    • M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2005.
    • M. Atzori, F. Bonchi, F. Giannotti, and D. Pedreschi. k-anonymous patterns. In Knowledge Discovery in Databases: PKDD 2005, 9th European Conference on Principles and Practice of Knowledge Discovery in Databases, Porto, Portugal, October 3-7, 2005, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2005.
  • 8
    • 84878037002 scopus 로고    scopus 로고
    • A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2006.
    • A. Friedman, A. Schuster, and R. Wolff, k-anonymous decision tree induction. In Knowledge Discovery in Databases: PKDD 2006, 10th European Conference on Principles and Practice of Knowledge Discovery in Databases, Berlin, Germany, September 18-22, 2006, Proceedings, Lecture Notes in Computer Science, pages 10-21. Springer, 2006.
  • 10
    • 0003979335 scopus 로고    scopus 로고
    • chapter General Cryptographic Protocols. Cambridge University Press
    • O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols. Cambridge University Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 11
  • 16
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag, Aug. 20-24
    • Y Lindell and B. Pinkas. Privacy preserving data mining. In Advances in Cryptology - CRYPTO 2000, pages 36-54. Springer-Verlag, Aug. 20-24 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Advances in Cryptology, Eurocrypt '98, Springer-Verlag
    • T. Okamoto and S. Uchiyama. A new public-key cryptosystem as secure as factoring. In Advances in Cryptology - Eurocrypt '98, LNCS 1403, pages 308-318. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 24
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Nov
    • J. Vaidya and C. Clifton. Secure set intersection cardinality with application to association rule mining. Journal of Computer Security, 13(4):593-622, Nov. 2005.
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.