메뉴 건너뛰기




Volumn 2, Issue 4, 2008, Pages 353-375

Privacy-preserving data mining in the malicious model

Author keywords

Malicious model; Privacy preserving data mining; Secure multiparty computation

Indexed keywords

ASSOCIATION RULES; CRYPTOGRAPHY; DATA MINING; ECONOMIC AND SOCIAL EFFECTS;

EID: 85086419359     PISSN: 17441765     EISSN: 17441773     Source Type: Journal    
DOI: 10.1504/IJICS.2008.022488     Document Type: Article
Times cited : (41)

References (23)
  • 1
    • 0035879575 scopus 로고    scopus 로고
    • A fair and efficient solution to the socialist millionaires' problem'
    • Boudot, F., Schoenmakers, B. and Traoré, J. (2001) 'A fair and efficient solution to the socialist millionaires' problem', Discrete Applied Mathematics, Vol. 111, Nos. 1-2, pp.23-36.
    • (2001) Discrete Applied Mathematics , vol.111 , Issue.1-2 , pp. 23-36
    • Boudot, F.1    Schoenmakers, B.2    Traoré, J.3
  • 2
    • 0000731055 scopus 로고    scopus 로고
    • Security and composition of multi-party cryptographic protocols
    • Canetti, R. (2000) 'Security and composition of multi-party cryptographic protocols', Journal of Cryptology, Vol. 13, No. 1, pp.143-202.
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 143-202
    • Canetti, R.1
  • 3
    • 33746088658 scopus 로고    scopus 로고
    • Multi-party computation from threshold homomorphic encryption
    • Technical Report RS-00-14, Basic Research in Computer Science, BRICS, June
    • Cramer, R., Damgard, I. and Nielsen, J.B. (2000) 'Multi-party computation from threshold homomorphic encryption', Technical Report RS-00-14, Basic Research in Computer Science - BRICS, June.
    • (2000)
    • Cramer, R.1    Damgard, I.2    Nielsen, J.B.3
  • 7
    • 1642302606 scopus 로고    scopus 로고
    • Building decision tree classifier on private data
    • C. Clifton and V. Estivill-Castro Eds, Australian Computer Society, Maebashi City, Japan, 9 December
    • Du, W. and Zhan, Z. (2002) 'Building decision tree classifier on private data', in C. Clifton and V. Estivill-Castro (Eds.) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining Australian Computer Society, Maebashi City, Japan, 9 December, Vol. 14, pp.1-8.
    • (2002) IEEE International Conference on Data Mining Workshop on Privacy, Security, and Data Mining , vol.14 , pp. 1-8
    • Du, W.1    Zhan, Z.2
  • 8
    • 12244263240 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • International Association for Cryptologic Research IACR, Interlaken, Switzerland, 2-6 May
    • Freedman, M.J., Nissim, K. and Pinkas, B. (2004) 'Efficient private matching and set intersection', Eurocrypt 2004, International Association for Cryptologic Research (IACR), Interlaken, Switzerland, 2-6 May.
    • (2004) Eurocrypt 2004
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 9
    • 4944220664 scopus 로고    scopus 로고
    • Privacy-preserving data mining on data grids in the presence of malicious participants
    • Honolulu, Hawaii, June
    • Gilburd, B., Schuster, A. and Wolff, R. (2004) 'Privacy-preserving data mining on data grids in the presence of malicious participants', Proceedings of HPDC04, Honolulu, Hawaii, June.
    • (2004) Proceedings of HPDC04
    • Gilburd, B.1    Schuster, A.2    Wolff, R.3
  • 10
    • 0003691180 scopus 로고    scopus 로고
    • The Foundations of Cryptography
    • Chap. 7, Cambridge University Press
    • Goldreich, O. (2004) The Foundations of Cryptography, Chap. 7, General Cryptographic Protocols, Cambridge University Press, Vol. 2.
    • (2004) General Cryptographic Protocols , vol.2
    • Goldreich, O.1
  • 12
    • 4544361334 scopus 로고    scopus 로고
    • Privacy-preserving distributed mining of association rules on horizontally partitioned data
    • September
    • Kantarcioǧlu, M. and Clifton, C. (2004a) 'Privacy-preserving distributed mining of association rules on horizontally partitioned data', IEEE TKDE, September, Vol. 16, No. 9, pp.1026-1037.
    • (2004) IEEE TKDE , vol.16 , Issue.9 , pp. 1026-1037
    • Kantarcioǧlu, M.1    Clifton, C.2
  • 16
    • 19744365747 scopus 로고    scopus 로고
    • Privacy preserving clustering with distributed EM mixture modeling
    • July
    • Lin, X., Clifton, C. and Zhu, M. (2005) 'Privacy preserving clustering with distributed EM mixture modeling', Knowledge and Information Systems, July, Vol. 8, No. 1, pp.68-81.
    • (2005) Knowledge and Information Systems , vol.8 , Issue.1 , pp. 68-81
    • Lin, X.1    Clifton, C.2    Zhu, M.3
  • 17
    • 84974555530 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Springer-Verlag, 20-24 August, pp
    • Lindell, Y. and Pinkas, B. (2000) 'Privacy preserving data mining', Advances in Cryptology - CRYPTO 2000, Springer-Verlag, 20-24 August, pp.36-54.
    • (2000) Advances in Cryptology - CRYPTO 2000 , pp. 36-54
    • Lindell, Y.1    Pinkas, B.2
  • 18
    • 33746437508 scopus 로고    scopus 로고
    • Privacy preserving data mining
    • Lindell, Y. and Pinkas, B. (2002) 'Privacy preserving data mining', Journal of Cryptology, Vol. 15, No. 3, pp.177-206.
    • (2002) Journal of Cryptology , vol.15 , Issue.3 , pp. 177-206
    • Lindell, Y.1    Pinkas, B.2
  • 20
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Paillier, P. (1999) 'Public-key cryptosystems based on composite degree residuosity classes', EUROCRYPT, pp.223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 23
    • 33746929480 scopus 로고    scopus 로고
    • Privacy-preserving computation of Bayesian networks on vertically partitioned data
    • Yang, Z. and Wright, R.N. (2006) 'Privacy-preserving computation of Bayesian networks on vertically partitioned data', IEEE Transactions on Knowledge and Data Engineering, Vol. 18, No. 9, pp.1253-1264.
    • (2006) IEEE Transactions on Knowledge and Data Engineering , vol.18 , Issue.9 , pp. 1253-1264
    • Yang, Z.1    Wright, R.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.