Distributed Privacy Preserving Clustering via Homomorphic Secret Sharing and Its Application to (Vertically) Partitioned Spatio-Temporal Data
暂无分享,去创建一个
Yücel Saygin | Albert Levi | Erkay Savas | Can Yildizli | Thomas Brochmann Pedersen | A. Levi | Y. Saygin | T. Pedersen | E. Savaş | Can Yildizli
[1] Jill Slay,et al. Voice Over IP: Privacy and Forensic Implications , 2009, Int. J. Digit. Crime Forensics.
[2] Yücel Saygin,et al. Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.
[3] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[4] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[5] Grigore-Octav Stan,et al. Cross-Border Transfer of Personal Data: The Example of Romanian Legislation , 2011 .
[6] Rebecca N. Wright,et al. Privacy-preserving Bayesian network structure computation on distributed heterogeneous data , 2004, KDD.
[7] Moti Yung,et al. Non-interactive cryptocomputing for NC/sup 1/ , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Dianne Nicol,et al. Genetic Testing and Protection of Genetic Privacy: A Comparative Legal Analysis in Europe and Australia , 2011 .
[10] Taneli Mielikäinen,et al. Cryptographically private support vector machines , 2006, KDD '06.
[11] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[12] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[13] Marc Fischlin,et al. A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires , 2001, CT-RSA.
[14] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[15] Matthew Sorell,et al. Reliable Motion Detection, Location and Audit in Surveillance Video , 2009, Int. J. Digit. Crime Forensics.
[16] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[17] Yücel Saygin,et al. Efficient Privacy Preserving Distributed Clustering Based on Secret Sharing , 2007, PAKDD Workshops.
[18] Chris Clifton,et al. Privacy-preserving k-means clustering over vertically partitioned data , 2003, KDD '03.
[19] Philip S. Yu,et al. Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.