期刊文献+

分布式环境下基于隐私保护的决策树方法的研究

下载PDF
导出
摘要 隐私保护数据挖掘成为目前数据挖掘的新兴热点,如何在保护隐私不被泄露的条件下发现隐藏的规则成为研究的重点。为此将隐私保护应用于决策树生成算法,使得在不泄漏隐私数据的前提下同样可以建立准确的决策树。
作者 曹华
出处 《甘肃科技》 2011年第7期14-15,39,共3页 Gansu Science and Technology
  • 相关文献

参考文献6

二级参考文献43

  • 1张特来,刘万军.数据挖掘在供应管理中的应用[J].微计算机信息,2005,21(10X):182-183. 被引量:11
  • 2Lindell Y,Pinkas B.Privacy Preserving Data Mining[C].Advances in Cryptology-Crypto2000,Lecture Notes in Computer Science,2000.
  • 3Agrawal R,Srikant R.Privacy-preserving Data Mining[C].Pro-ceedings of the 2000 ACM SIGMOD on Management of Data,2000.
  • 4Yao A C.Protocols for Secure Computations[C].Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science,1982.
  • 5Du Wenliang,Zhan Zhijun.Building Decision Tree Classifier on Private Data[C].Proceedings of the IEEE ICDM Workshop on Privacy,Security and Data Mining,2002.
  • 6J Benaloh, D Tuinstra. Receipt-free secret-ballot elections [C].In: Proc of the 26th ACM Symposium on Theory of Computing. New York: ACM Press, 1994. 544-553
  • 7J Groth. Efficient maximal privacy in boardroom voting and anonymous broadcast [G]. In: Proc of the 8th Int'l Conf on Financial Cryptography ( FC2004 ), LNCS 3110. Berlin:Springer-Verlag, 2004. 90-104
  • 8R Cramer, M Franklin, B Schoenmakers, et al. Multauthority secret-ballot elections with linear work [G]. In: Advances in Cryptology-Eurocrypt' 96, LNCS 1070. Berlin: Springer-Verlag, 1996. 72-83
  • 9R Cramer, R Gennaro, B Schoenmakers. A secure and optimally efficient multi-authority election scheme [G]. In:Advances in Cryptology-Eurocrypt' 97, LNCS 1223. Berlin:Springer-Verlag, 1997. 103-118
  • 10I Damgard, M Jurik. A generalisation, a simplication and some applications of Paillier' s probabilistic public-key system [G].In: The 4th Int'l Workshop on Practice and Theory in Public Key Cryptosystems (PKC 2001 ), LNCS 1992. Berlin:Springer-Verlag, 2001. 119-136

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部