Author:
Mohapatra Debasis,Patra Manas Ranjan
Publisher
Springer International Publishing
Reference18 articles.
1. Lindell, Y., Pinkas, B.: Secure Multiparty Computation for Privacy-Preserving Data Mining. The Journal of Privacy and Confidentiality 1, 59–98 (2009)
2. Hann, J., Kamber, N.: Data mining: Concepts and techniques. MorganKanfmann Publishers, San Francisco (2001)
3. Lecture Notes in Computer Science;G. Aggarwal,2005
4. Sweeney, L.: k-ANONYMITY: A Model for Protecting Privacy, International Journal on Uncertainty. Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)
5. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: Proc. 22nd Intnl. Conf. Data Engg (ICDE), p. 24 (2006)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献