Author:
Sharma Vibhor,Bhushan Shashi,Singh Anuj Kumar,Kumar Pramod
Publisher
Springer Nature Singapore
Reference21 articles.
1. Friedman A, Schuster A (25–28 July 2010) Data mining with differential privacy, KDD 10. https://doi.org/10.1145/1835804.1835868
2. Agarwal CC, Yu PS (2004) A condensation approach to privacy preserving data mining. In: Advances in database technology—EDBT. Lecture notes in computer science. Springer, Berlin, Heidelberg, 2992: 183–199
3. Chouhan A, Kumari A, Saiyad M (2019) Secure multiparty computation and privacy preserving scheme using homomorphic elliptic curve cryptography. 2019 international conference on intelligent computing and control systems (ICCS). Madurai, India, pp 776–780
4. Gascón A, et al. Privacy-preserving distributed linear regression on high-dimensional data. Proc Priv Enhancing Technol 2017(4):345–364
5. Chouhan A, Patel S, Jinwala DC (2013) Comparative analysis of elliptic curve cryptography based algorithms to implement privacy preserving clustering through secure multiparty computation. Publ J Inf Sec, Sci Res
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献