Privacy Preserving Data Mining
- 11 August 2000
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Non-Interactive Oblivious Transfer and ApplicationsPublished by Springer Science and Business Media LLC ,2001
- Secure Multiparty Computation of ApproximationsLecture Notes in Computer Science, 2001
- Distributed Oblivious TransferLecture Notes in Computer Science, 2000
- Two Party RSA Key GenerationLecture Notes in Computer Science, 1999
- Oblivious transfer and polynomial evaluationPublished by Association for Computing Machinery (ACM) ,1999
- Efficient generation of shared RSA keysLecture Notes in Computer Science, 1997
- Comparing information without leaking itCommunications of the ACM, 1996
- Multiparty unconditionally secure protocolsPublished by Association for Computing Machinery (ACM) ,1988
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987
- A randomized protocol for signing contractsCommunications of the ACM, 1985