Towards Efficient Cryptography for Privacy Preserving Data Mining in Distributed Systems
暂无分享,去创建一个
[1] Jie Wang,et al. Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization , 2007, 2007 IEEE Intelligence and Security Informatics.
[2] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[3] Ronald Cramer,et al. A secure and optimally efficient multi-authority election scheme , 1997, Eur. Trans. Telecommun..
[4] Dimitris Gritzalis,et al. Secure Electronic Voting , 2003, Advances in Information Security.
[5] Rakesh Agrawal,et al. Privacy-preserving data mining , 2000, SIGMOD 2000.
[6] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.
[7] Ivan Damgård,et al. A generalization of Paillier’s public-key system with applications to electronic voting , 2010, International Journal of Information Security.
[8] Shafi Goldwasser,et al. Multi party computations: past and present , 1997, PODC '97.
[9] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[10] David C. Parkes,et al. Practical secrecy-preserving, verifiably correct and trustworthy auctions , 2006, ICEC '06.
[11] Benny Pinkas,et al. Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.
[12] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .
[13] Berry Schoenmakers,et al. A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic , 1999, CRYPTO.
[14] Chris Clifton,et al. Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.
[15] Philip S. Yu,et al. Data Mining: An Overview from a Database Perspective , 1996, IEEE Trans. Knowl. Data Eng..
[16] Josep Domingo-Ferrer,et al. Inference Control in Statistical Databases, From Theory to Practice , 2002 .
[17] Jacques Stern,et al. Practical multi-candidate election system , 2001, PODC '01.
[18] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2000, Journal of Cryptology.
[19] Sheng Zhong,et al. Privacy-Preserving Classification of Customer Data without Loss of Accuracy , 2005, SDM.
[20] Gu Si-yang,et al. Privacy preserving association rule mining in vertically partitioned data , 2006 .
[21] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[22] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .