Speeding Up Secure Computations via Embedded Caching
暂无分享,去创建一个
S. Han | K. Zhai | W. K. Ng | A. R. Herianto
[1] Chris Clifton,et al. Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.
[2] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[3] Shuguo Han,et al. Privacy-Preserving Linear Fisher Discriminant Analysis , 2008, PAKDD.
[4] Wenliang Du,et al. Privacy-preserving cooperative scientific computations , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[5] Rebecca N. Wright,et al. Privacy-preserving distributed k-means clustering over arbitrarily partitioned data , 2005, KDD '05.
[6] Rebecca N. Wright,et al. Experimental analysis of a privacy-preserving scalar product protocol , 2006, Comput. Syst. Sci. Eng..
[7] Moni Naor,et al. Oblivious transfer and polynomial evaluation , 1999, STOC '99.
[8] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[9] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[10] Philip S. Yu,et al. Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[11] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[12] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.