How to deal with malicious users in privacy‐preserving distributed data mining (Q3497744): Difference between revisions
From MaRDI portal
Latest revision as of 20:44, 1 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | How to deal with malicious users in privacy‐preserving distributed data mining |
scientific article |
Statements
How to deal with malicious users in privacy‐preserving distributed data mining (English)
0 references
27 July 2009
0 references
zero-knowledge protocol
0 references
L2-norm
0 references
privacy
0 references
malicious users
0 references
vector addition
0 references
0 references
0 references