共 50 条
- [22] Privacy preserving sequential pattern mining based on secure two-party computation [J]. PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
- [23] Secure Multi-party Protocols for Privacy Preserving Data Mining [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 526 - 537
- [24] Privacy preserving sequential pattern mining based on secure multi-party computation [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
- [25] Secure computation for data privacy [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 58 - 62
- [26] Privacy preserving association rules mining based on secure two-party computation [J]. INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
- [27] On private scalar product computation for privacy-preserving data mining [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 104 - 120