Privacy preserving data mining

From MaRDI portal
Publication:5917416

DOI10.1007/s00145-001-0019-2zbMath1010.94008OpenAlexW2047370889MaRDI QIDQ5917416

Benny Pinkas, Yehuda Lindell

Publication date: 1 December 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-001-0019-2




Related Items (32)

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud IntegrationPrivacy-preserving inverse distance weighted interpolationPrivacy-preserving algorithms for distributed mining of frequent itemsetsPrivacy preserving feature selection and multiclass classification for horizontally distributed dataHow to deal with malicious users in privacy‐preserving distributed data miningSecure Naïve Bayesian Classification over Encrypted Data in CloudSecure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVMAmortizing division and exponentiationPrivacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attackPrivacy-preserving ridge regression on distributed dataPrivacy preserving linear regression modeling of distributed databasesPractical Secure Naïve Bayesian Classification Over Encrypted Big Data in CloudEfficient set operations in the presence of malicious adversariesConfidential gossipAsynchronous privacy-preserving iterative computation on peer-to-peer networksPrivacy Preserving Data Mining within Anonymous Credential SystemsSymmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computationsOblivious polynomial evaluation and secure set-intersection from algebraic PRFsItemset frequency satisfiability: complexity and axiomatizationSymmetric cryptographic protocols for extended millionaires' problemPrivate set-intersection with common set-upFast Private Norm Estimation and Heavy HittersEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesSecure computation of the median (and other elements of specified ranks)\(k\)-anonymous data collectionDifferentially-private learning of low dimensional manifoldsPrivacy-Preserving Subgraph Matching Protocol for Two PartiesEfficient Secure Two-Party ExponentiationPrivate multiparty sampling and approximation of vector combinationsOblivious polynomial evaluation and oblivious neural learningAN IMPROVED TECHNIQUE FOR PRIVACY PRESERVING CLUSTERING BASED ON DAUBECHIES-2 WAVELET TRANSFORMPrivacy preserving electronic data gathering






This page was built for publication: Privacy preserving data mining