Two methods for privacy preserving data mining with malicious participants (Q2456504): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2007.07.013 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1978740778 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536793 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy reasoning model under quotient space structure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-preserving algorithms for distributed mining of frequent itemsets / rank
 
Normal rank

Latest revision as of 10:17, 27 June 2024

scientific article
Language Label Description Also known as
English
Two methods for privacy preserving data mining with malicious participants
scientific article

    Statements

    Two methods for privacy preserving data mining with malicious participants (English)
    0 references
    0 references
    0 references
    18 October 2007
    0 references
    data mining
    0 references
    privacy
    0 references
    malicious model
    0 references
    attacks
    0 references
    protocols
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references