Privacy-preserving distributed association rule mining via semi-trusted mixer
暂无分享,去创建一个
[1] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[2] Sheng Zhong,et al. Privacy-Preserving Classification of Customer Data without Loss of Accuracy , 2005, SDM.
[3] Chris Clifton,et al. Privacy-preserving data mining: why, how, and when , 2004, IEEE Security & Privacy Magazine.
[4] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[5] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[6] Xun Yi. Identity-based fault-tolerant conference key agreement , 2004, IEEE Transactions on Dependable and Secure Computing.
[7] Elisa Bertino,et al. Association rule hiding , 2004, IEEE Transactions on Knowledge and Data Engineering.
[8] Alexandre V. Evfimievski,et al. Privacy preserving mining of association rules , 2002, Inf. Syst..
[9] Chris Clifton,et al. Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data , 2004, SDM.
[10] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[11] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[12] Jaideep Vaidya,et al. Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data , 2003 .
[13] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[14] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[15] Jayant R. Haritsa,et al. Maintaining Data Privacy in Association Rule Mining , 2002, VLDB.
[16] Wen-Guey Tzeng,et al. A Secure Fault-Tolerant Conference-Key Agreement Protocol , 2002, IEEE Trans. Computers.
[17] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[18] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[19] Philip K. Chan,et al. Advances in Distributed and Parallel Knowledge Discovery , 2000 .
[20] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[21] Arjen K. Lenstra,et al. Integer Factoring , 2000, Encyclopedia of Cryptography and Security.
[22] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[23] Helger Lipmaa. AES Candidates: A Survey of Implementations , 1999 .
[24] Michael K. Reiter,et al. Fair Exchange with a Semi-Trusted Third Party (extended abstract) , 1997, CCS.
[25] Rakesh Agrawal,et al. Parallel Mining of Association Rules , 1996, IEEE Trans. Knowl. Data Eng..
[26] Jiawei Han,et al. A fast distributed algorithm for mining association rules , 1996, Fourth International Conference on Parallel and Distributed Information Systems.
[27] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[28] R. Agarwal. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[29] Eyal Kushilevitz,et al. A Communication-Privacy Tradeoff for Modular Addition , 1993, Inf. Process. Lett..
[30] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[31] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[32] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[33] Josh Benaloh,et al. Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing , 1986, CRYPTO.
[34] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[35] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[36] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.