Two methods for privacy preserving data mining with malicious participants (Q2456504): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
(One intermediate revision by one other user not shown) | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/j.ins.2007.07.013 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1978740778 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Foundations of Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Foundations of Cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536793 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Fuzzy reasoning model under quotient space structure / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Privacy-preserving algorithms for distributed mining of frequent itemsets / rank | |||
Normal rank |
Latest revision as of 10:17, 27 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Two methods for privacy preserving data mining with malicious participants |
scientific article |
Statements
Two methods for privacy preserving data mining with malicious participants (English)
0 references
18 October 2007
0 references
data mining
0 references
privacy
0 references
malicious model
0 references
attacks
0 references
protocols
0 references