Privacy of outsourced two‐party k‐means clustering
暂无分享,去创建一个
[1] Jaideep Vaidya,et al. Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[4] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[5] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[6] Rebecca N. Wright,et al. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.
[7] Vinod Vaikuntanathan,et al. Can homomorphic encryption be practical? , 2011, CCSW '11.
[8] Jin Tong,et al. US Government Cloud Computing Technology Roadmap , 2014 .
[9] Somesh Jha,et al. Privacy Preserving Clustering , 2005, ESORICS.
[10] Dongxi Liu,et al. Programmable Order-Preserving Secure Index for Encrypted Database Query , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.
[11] Chris Clifton,et al. Privacy-preserving decision trees over vertically partitioned data , 2005, TKDD.
[12] Fred Douglis. World Wide Web Characterization and Performance Evaluation - Preface , 1999, World Wide Web.
[13] Yanchun Zhang,et al. Equally contributory privacy-preserving k-means clustering over vertically partitioned data , 2013, Inf. Syst..
[14] S. P. Lloyd,et al. Least squares quantization in PCM , 1982, IEEE Trans. Inf. Theory.
[15] Dongxi Liu,et al. Privacy of outsourced k-means clustering , 2014, AsiaCCS.
[16] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[17] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[18] Zhe Xia,et al. Privacy-preserving raw data collection without a trusted authority for IoT , 2019, Comput. Networks.
[19] Wei Jiang,et al. Secure k-nearest neighbor query over encrypted data in outsourced environments , 2013, 2014 IEEE 30th International Conference on Data Engineering.
[20] Keng-Pei Lin. Privacy-preserving kernel k-means clustering outsourcing with random transformation , 2016, Knowledge and Information Systems.
[21] Rafail Ostrovsky,et al. Secure two-party k-means clustering , 2007, CCS '07.
[22] Yehuda Lindell,et al. An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries , 2007, Journal of Cryptology.
[23] Zoe L. Jiang,et al. Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks , 2015, 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN).
[24] Jaideep Vaidya,et al. Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.
[25] Dongxi Liu,et al. Privacy-Preserving and Outsourced Multi-user K-Means Clustering , 2014, 2015 IEEE Conference on Collaboration and Internet Computing (CIC).