Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1759770 - MaRDI portal

scientific article; zbMATH DE number 1759770

From MaRDI portal
Publication:4536793

zbMath0989.68506MaRDI QIDQ4536793

Yehuda Lindell, Benny Pinkas

Publication date: 6 August 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (30)

Data envelopment analysis may obfuscate corporate financial data: using support vector machine and data envelopment analysis to predict corporate failure for nonmanufacturing firmsSome basics on privacy techniques, anonymization and their big data challengesSecure Computation, I/O-Efficient Algorithms and Distributed SignaturesA firm foundation for statistical disclosure controlProviding accurate models across private partitioned data: secure maximum likelihood estimationTowards semantically secure outsourcing of association rule mining on categorical dataPrivacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing schemeThe density-based clustering method for privacy-preserving data miningPrivacy-preserving algorithms for distributed mining of frequent itemsetsPrivacy-preserving mixed set operationsOblivious sampling with applications to two-party \(k\)-means clusteringAmortizing division and exponentiationMyOPE: malicious security for oblivious polynomial evaluationDifferentially private naive Bayes learning over multiple data sourcesDividing secrets to secure data outsourcingToward practical privacy-preserving linear regressionPrivacy preserving linear regression modeling of distributed databasesImproved Garbled Circuit: Free XOR Gates and ApplicationsPrivacy Preserving Data Mining within Anonymous Credential SystemsTwo methods for privacy preserving data mining with malicious participantsQuadratic Error Minimization in a Distributed Environment with Privacy PreservingSecure Top-k Subgroup DiscoverySecure Multi-party Computation: Information Flow of Outputs and Game TheoryOn the exact round complexity of secure three-party computationPrivacy-Preserving Subgraph Matching Protocol for Two PartiesGeneralization-based privacy preservation and discrimination prevention in data publishing and miningPreserving worker privacy in crowdsourcingSecure Bayesian model averaging for horizontally partitioned dataSecure computation with horizontally partitioned data using adaptive regression splinesOblivious polynomial evaluation and oblivious neural learning




This page was built for publication: