Two methods for privacy preserving data mining with malicious participants
From MaRDI portal
Publication:2456504
DOI10.1016/j.ins.2007.07.013zbMath1126.68069OpenAlexW1978740778MaRDI QIDQ2456504
Publication date: 18 October 2007
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2007.07.013
Database theory (68P15) Learning and adaptive systems in artificial intelligence (68T05) Cryptography (94A60) Data encryption (aspects in computer science) (68P25)
Related Items (5)
Towards the evaluation of time series protection methods ⋮ Privacy-preserving health data collection for preschool children ⋮ Service reliability modeling of distributed computing systems with virus epidemics ⋮ A communication-efficient private matching scheme in client-server model ⋮ \(k\)-anonymous data collection
Uses Software
Cites Work
This page was built for publication: Two methods for privacy preserving data mining with malicious participants