Mining frequent itemsets in the presence of malicious participants
暂无分享,去创建一个
[1] Sheng Zhong,et al. Privacy-preserving algorithms for distributed mining of frequent itemsets , 2007, Inf. Sci..
[2] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[3] Yücel Saygin,et al. Privacy Preserving Clustering on Horizontally Partitioned Data , 2006, 22nd International Conference on Data Engineering Workshops (ICDEW'06).
[4] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[5] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[6] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[7] Wenliang Du,et al. Building decision tree classifier on private data , 2002 .
[8] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[9] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[10] Divyakant Agrawal,et al. Privacy preserving decision tree learning over multiple parties , 2007, Data Knowl. Eng..
[11] Yanchun Zhang,et al. Privacy-preserving distributed association rule mining via semi-trusted mixer , 2007, Data Knowl. Eng..
[12] Jaideep Vaidya,et al. Privacy preserving association rule mining in vertically partitioned data , 2002, KDD.
[13] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[14] Tsvi Kuflik,et al. PRAW - A PRivAcy model for the Web , 2005, J. Assoc. Inf. Sci. Technol..
[15] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[16] Stan Matwin,et al. Privacy-Preserving Collaborative Association Rule Mining , 2005, ICEB.
[17] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[18] Ehud Gudes,et al. Association rules mining in vertically partitioned databases , 2006, Data Knowl. Eng..
[19] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[20] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .