Two methods for privacy preserving data mining with malicious participants

From MaRDI portal
Publication:2456504