메뉴 건너뛰기




Volumn 1880, Issue , 2000, Pages 36-54

Privacy preserving data mining

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; DATA PRIVACY; DATABASE SYSTEMS; DECISION TREES; TREES (MATHEMATICS);

EID: 84974555530     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44598-6_3     Document Type: Conference Paper
Times cited : (780)

References (21)
  • 2
    • 84898960610 scopus 로고
    • Completeness theorems for non cryptographic fault tolerant distributed computation
    • M. Ben-Or, S. Goldwasser and A. Wigderson, Completeness theorems for non cryptographic fault tolerant distributed computation, 20th STOC, (1988), 1-9.
    • (1988) 20Th STOC , pp. 1-9
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Springer-Verlag
    • D. Boneh and M. Franklin, Efficient generation of shared RSA keys, Proc. of Crypto’ 97, LNCS, Vol. 1233, Springer-Verlag, pp. 425-439, 1997.
    • (1997) Proc. Of Crypto’ 97, LNCS , vol.1233 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 4
    • 35048837958 scopus 로고    scopus 로고
    • Security and Composition of Multi-party Cryptographic Protocols
    • Theory of Cryptography Library
    • R. Canetti, Security and Composition of Multi-party Cryptographic Protocols. To appear in the Journal of Cryptology. Available from the Theory of Cryptography Library at http://philby.ucsd.edu/cryptlib, 1998.
    • (1998) To Appear in the Journal of Cryptology
    • Canetti, R.1
  • 9
    • 0030150177 scopus 로고    scopus 로고
    • Comparing Information Without Leaking It
    • May
    • R. Fagin, M. Naor and P. Winkler, Comparing Information Without Leaking It, Communications of the ACM, vol 39, May 1996, pp. 77-85.
    • (1996) Communications of the ACM , vol.39 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 11
    • 84957104180 scopus 로고    scopus 로고
    • Key Generation, Proc of Crypto ’99
    • Springer-Verlag
    • N. Gilboa, Two Party RSA Key Generation, Proc of Crypto ’99, Lecture Notes in Computer Science, Vol. 1666, Springer-Verlag, pp. 116-129, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 116-129
    • Gilboa, N.1    Two Party, R.2
  • 16
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious Transfer and Polynomial Evaluation
    • Atlanta, GA, May 1-4
    • M. Naor and B. Pinkas, Oblivious Transfer and Polynomial Evaluation, Proc. of the 31st STOC, Atlanta, GA, pp. 245-254, May 1-4, 1999.
    • (1999) Proc. Of the 31St STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 18
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuocity Classes
    • P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuocity Classes. Proc. of Eurocrypt ’99, LNCS Vol. 1592, pp. 223-238, 1999.
    • (1999) Proc. Of Eurocrypt ’99, LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 19
    • 33744584654 scopus 로고
    • Induction of Decision Trees
    • J. Ross Quinlan, Induction of Decision Trees. Machine Learning 1(1): 81-106(1986)
    • (1986) Machine Learning , vol.1 , Issue.1 , pp. 81-106
    • Ross Quinlan, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.