Title of article :
Two methods for privacy preserving data mining with malicious participants
Author/Authors :
Divyesh Shah، نويسنده , , Sheng Zhong، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2007
Pages :
16
From page :
5468
To page :
5483
Keywords :
DATA MINING , Privacy , Malicious model , protocols , Attacks
Journal title :
Information Sciences
Serial Year :
2007
Journal title :
Information Sciences
Record number :
177417
Link To Document :
بازگشت