Privacy Preserving Sequential Pattern Mining Based on Secure Multi-party Computation
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Padhraic Smyth,et al. From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..
[3] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[4] Elisa Bertino,et al. State-of-the-art in privacy preserving data mining , 2004, SGMD.
[5] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[6] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[7] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[8] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.