Efficient Privacy-Preserving Link Discovery
暂无分享,去创建一个
Basit Shafiq | Jaideep Vaidya | Nabil R. Adam | Evimaria Terzi | Xiaoyun He | Tyrone Grandison | N. Adam | Jaideep Vaidya | Basit Shafiq | Tyrone Grandison | Xiaoyun He | Evimaria Terzi
[1] Hsinchun Chen,et al. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..
[2] Latanya Sweeney,et al. Privacy-enhanced linking , 2005, SKDD.
[3] Basit Shafiq,et al. Privacy-preserving link discovery , 2008, SAC '08.
[4] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[5] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[6] Bart Goethals,et al. On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.
[7] Chris Clifton,et al. Privacy-Preserving Data Mining , 2006, Encyclopedia of Database Systems.
[8] J. Canny,et al. A Secure Online Algorithm for Link Analysis on Weighted Graph , 2003 .
[9] Chris Clifton,et al. Privacy Preserving Data Mining (Advances in Information Security) , 2005 .
[10] Béla Bollobás,et al. Random Graphs: Notation , 2001 .
[11] William M. Pottenger,et al. Link Analysis of Higher-Order Paths in Supervised Learning Datasets , 2006 .
[12] Choonsik Park,et al. Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers , 2005, ICISC.
[13] Raymond J. Mooney,et al. Relational Data Mining with Inductive Logic Programming for Link Discovery , 2002 .
[14] Béla Bollobás,et al. Random Graphs , 1985 .
[15] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[16] Lise Getoor,et al. Link mining: a survey , 2005, SKDD.