Database Reference
In-Depth Information
55. Y.-H. Wu, C.-M. Chiang, and A. Chen. Hiding sensitive association rules with limited side
effects. IEEE Transactions on Knowledge and Data Engineering , 19(1):29-42, 2007.
56. A. C. Yao. Protocols for secure computations. IEEE Symposium on Foundations of Computer
Science , pages 160-164, 1982.
57. N. Zhang, S. Wang, and W. Zhao. A new scheme on privacy preserving association rule mining.
In Proceedings of the 2004 Conference on Knowledge Discovery in Databases , PKDD, pages
484-495, 2004.
Search WWH ::




Custom Search