메뉴 건너뛰기




Volumn 7371 LNCS, Issue , 2012, Pages 161-176

Privacy-preserving subgraph discovery

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC PRIMITIVES; DISCOVERY ALGORITHM; DRUG DISCOVERY; EXPERIMENTAL EVALUATION; FREQUENT SUBGRAPHS; GRAPH STRUCTURED DATA; PRIVACY PRESERVING; SINGLE SITES; SUBGRAPHS;

EID: 84864372044     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-31540-4_13     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 4
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • Clifton, C., Estivill- Castro, V. (eds.) Australian Computer Society, Maebashi City
    • Du, W., Zhan, Z.: Building decision tree classifier on private data. In: Clifton, C., Estivill- Castro, V. (eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, December 9, vol. 14, pp. 1-8. Australian Computer Society, Maebashi City (2002), http://crpit.com/Vol14. html
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining, December 9 , vol.14 , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 5
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • ACM, New York
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - a completeness theorem for protocols with honest majority. In: Proceedings of the 19th ACM Symposium on the Theory of Computing, pp. 218-229. ACM, New York (1987), http://doi.acm.org/10.1145/28395.28420
    • (1987) Proceedings of the 19th ACM Symposium on the Theory of Computing , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 6
    • 85008016154 scopus 로고    scopus 로고
    • Discovering frequent graph patterns using disjoint paths
    • Gudes, E., Shimony, S.E., Vanetik, N.: Discovering frequent graph patterns using disjoint paths. IEEE Trans. on Knowl. and Data Eng. 18, 1441-1456 (2006), http://dx.doi.org/10.1109/TKDE.2006.173
    • (2006) IEEE Trans. on Knowl. and Data Eng. , vol.18 , pp. 1441-1456
    • Gudes, E.1    Shimony, S.E.2    Vanetik, N.3
  • 7
    • 0037364958 scopus 로고    scopus 로고
    • Complete mining of frequent patterns from graphs: Mining graph data
    • Inokuchi, A., Washio, T., Motoda, H.: Complete mining of frequent patterns from graphs: Mining graph data. Mach. Learn. 50, 321-354 (2003), http://dl.acm.org/citation.cfm?id=608108.608123
    • (2003) Mach. Learn. , vol.50 , pp. 321-354
    • Inokuchi, A.1    Washio, T.2    Motoda, H.3
  • 10
    • 78149312583 scopus 로고    scopus 로고
    • Frequent subgraph discovery
    • Cercone, N., Lin, T.Y., Wu, X. (eds.) IEEE Computer Society
    • Kuramochi, M., Karypis, G.: Frequent subgraph discovery. In: Cercone, N., Lin, T.Y., Wu, X. (eds.) ICDM, pp. 313-320. IEEE Computer Society (2001)
    • (2001) ICDM , pp. 313-320
    • Kuramochi, M.1    Karypis, G.2
  • 11
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell, Y., Pinkas, B.: Privacy preserving data mining. Journal of Cryptology 15(3), 177-206 (2002)
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 13
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 14
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
    • Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory IT-24, 106-110 (1978)
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 17
    • 0032611213 scopus 로고    scopus 로고
    • Application of knowledge discovery to molecular biology: Identifying structural regularities in proteins
    • Su, S., Cook, D.J., Holder, L.B.: Application of knowledge discovery to molecular biology: Identifying structural regularities in proteins. In: Pacific Symposium on Biocomputing, pp. 190-201 (1999)
    • (1999) Pacific Symposium on Biocomputing , pp. 190-201
    • Su, S.1    Cook, D.J.2    Holder, L.B.3
  • 19
  • 21
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • Vaidya, J., Clifton, C.: Secure set intersection cardinality with application to association rule mining. Journal of Computer Security 13(4), 593-622 (2005)
    • (2005) Journal of Computer Security , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 23
    • 78149333073 scopus 로고    scopus 로고
    • Gspan: Graph-based substructure pattern mining
    • Yan, X., Han, J.: gspan: Graph-based substructure pattern mining. In: ICDM, pp. 721-724 (2002)
    • (2002) ICDM , pp. 721-724
    • Yan, X.1    Han, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.