scientific article; zbMATH DE number 1759770
From MaRDI portal
Publication:4536793
zbMath0989.68506MaRDI QIDQ4536793
Publication date: 6 August 2002
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Database theory (68P15) Learning and adaptive systems in artificial intelligence (68T05) Cryptography (94A60) Information storage and retrieval of data (68P20)
Related Items (30)
Data envelopment analysis may obfuscate corporate financial data: using support vector machine and data envelopment analysis to predict corporate failure for nonmanufacturing firms ⋮ Some basics on privacy techniques, anonymization and their big data challenges ⋮ Secure Computation, I/O-Efficient Algorithms and Distributed Signatures ⋮ A firm foundation for statistical disclosure control ⋮ Providing accurate models across private partitioned data: secure maximum likelihood estimation ⋮ Towards semantically secure outsourcing of association rule mining on categorical data ⋮ Privacy-preserving distributed mining of association rules using elliptic-curve cryptosystem and Shamir's secret sharing scheme ⋮ The density-based clustering method for privacy-preserving data mining ⋮ Privacy-preserving algorithms for distributed mining of frequent itemsets ⋮ Privacy-preserving mixed set operations ⋮ Oblivious sampling with applications to two-party \(k\)-means clustering ⋮ Amortizing division and exponentiation ⋮ MyOPE: malicious security for oblivious polynomial evaluation ⋮ Differentially private naive Bayes learning over multiple data sources ⋮ Dividing secrets to secure data outsourcing ⋮ Toward practical privacy-preserving linear regression ⋮ Privacy preserving linear regression modeling of distributed databases ⋮ Improved Garbled Circuit: Free XOR Gates and Applications ⋮ Privacy Preserving Data Mining within Anonymous Credential Systems ⋮ Two methods for privacy preserving data mining with malicious participants ⋮ Quadratic Error Minimization in a Distributed Environment with Privacy Preserving ⋮ Secure Top-k Subgroup Discovery ⋮ Secure Multi-party Computation: Information Flow of Outputs and Game Theory ⋮ On the exact round complexity of secure three-party computation ⋮ Privacy-Preserving Subgraph Matching Protocol for Two Parties ⋮ Generalization-based privacy preservation and discrimination prevention in data publishing and mining ⋮ Preserving worker privacy in crowdsourcing ⋮ Secure Bayesian model averaging for horizontally partitioned data ⋮ Secure computation with horizontally partitioned data using adaptive regression splines ⋮ Oblivious polynomial evaluation and oblivious neural learning
This page was built for publication: