Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers
Tài liệu tham khảo
D. Struck, Don’t store my data, Japanese tell government, in: International Herald Tribune, 25 August 2002.
Kargupta, 2000
J. Vaidya, C. Clifton, Privacy-preserving data mining: Why, how and when, IEEE Security and Privacy, November/December 2004, pp. 19–27.
Zhang, 2005, A new scheme on privacy-preserving data classification, 374
Sweeney, 2002, k-Anonymity: a model for protecting privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10, 557, 10.1142/S0218488502001648
Agrawal, 2000, Privacy-preserving data mining, 439
Lindell, 2002, Privacy preserving data mining, Journal of Cryptology, 15, 177, 10.1007/s00145-001-0019-2
Evfimievski, 2002, Privacy-preserving mining of association rules
Kantarcioglu, 2003, Privacy preserving naive Bayes classifier for horizontally partitioned data
Vaidya, 2002, Privacy-preserving association rule mining in vertically partitioned data, 639
Verykios, 2004, Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16, 434, 10.1109/TKDE.2004.1269668
Rizvi, 2002, Maintaining data privacy in association rule mining, 682
Clifton, 2002, Tools for privacy preserving distributed data mining, SIGKDD Exploration, 4, 1, 10.1145/772862.772867
Vaidya, 2003, Privacy-preserving k-means clustering over vertically partitioned data, 206
Kantarcioglu, 2003, Privacy-preserving naive Bayes classifier for horizontally partitioned data
Vaidya, 2004, Privacy preserving naive Bayes classifier on vertically partitioned data
Wright, 2004, Privacy-preserving Bayesian network structure computation on distributed heterogeneous data
Yang, 2005, Privacy-preserving classification of customer data without loss of accuracy
Kargupta, 2003, On the privacy preserving properties of random data perturbation techniques, 99
Yao, 1982, Protocols for secure computations (extended abstract), 160
Goldreich, 1987, How to play any mental game—a completeness theorem for protocols with honest majority, 218
Chaum, 1988, Multiparty unconditionally secure protocols, 11
ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 31, 469, 10.1109/TIT.1985.1057074
Yi, 2007, Privacy-preserving distributed association rule mining via semi-trusted mixer, Data and Knowledge Engineering, 63, 550, 10.1016/j.datak.2007.04.001
Han, 2000
Paillier, 1999, Public-key cryptosystems based on composite degree residuosity classes, 223
Lenstra, 2000, Integer factoring, Design, Code and Cryptography, 19, 101, 10.1023/A:1008397921377
Yao, 1986, How to generate and exchange secrets, 162