How to deal with malicious users in privacy‐preserving distributed data mining (Q3497744): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1260753
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: John F. Canny / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1002/sam.10029 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4243616933 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy preserving data mining / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249348 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplified VSS and fast-track multiparty computations with applications to threshold cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149671 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient noise-tolerant learning from statistical queries / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502503 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Player simulation and general adversary structures in perfect multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Knowledge Complexity of Interactive Proof Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035712 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3998482 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Definitions and properties of zero-knowledge proof systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374927 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4856179 / rank
 
Normal rank

Latest revision as of 19:44, 1 July 2024

scientific article
Language Label Description Also known as
English
How to deal with malicious users in privacy‐preserving distributed data mining
scientific article

    Statements

    How to deal with malicious users in privacy‐preserving distributed data mining (English)
    0 references
    0 references
    0 references
    27 July 2009
    0 references
    zero-knowledge protocol
    0 references
    L2-norm
    0 references
    privacy
    0 references
    malicious users
    0 references
    vector addition
    0 references

    Identifiers