Two methods for privacy preserving data mining with malicious participants (Q2456504): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536793 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy reasoning model under quotient space structure / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-preserving algorithms for distributed mining of frequent itemsets / rank
 
Normal rank

Latest revision as of 10:17, 27 June 2024

scientific article
Language Label Description Also known as
English
Two methods for privacy preserving data mining with malicious participants
scientific article

    Statements

    Two methods for privacy preserving data mining with malicious participants (English)
    0 references
    0 references
    0 references
    18 October 2007
    0 references
    data mining
    0 references
    privacy
    0 references
    malicious model
    0 references
    attacks
    0 references
    protocols
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references