2020 11th International Conference on Information and Knowledge Technology (IKT) 2020
DOI: 10.1109/ikt51791.2020.9345620
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Evaluation of Privacy Preserving Data Mining Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Public Key Encryption, Secret sharing, Homomorphic Encryption, Secure Multi-party computation (MPC), etc. are cryptography based techniques for preserving privacy in distributed data mining [14].…”
Section: Cryptography Based Approachmentioning
confidence: 99%
See 2 more Smart Citations
“…Public Key Encryption, Secret sharing, Homomorphic Encryption, Secure Multi-party computation (MPC), etc. are cryptography based techniques for preserving privacy in distributed data mining [14].…”
Section: Cryptography Based Approachmentioning
confidence: 99%
“…Secret sharing method is a set of two functions sharing function and relation function. Sharing function takes secret as an input and divides secret into n secret shares and relation function reproduce (recovery of secret from n-1 shares is impossible) secret from n shares of secret [14].…”
Section: Cryptography Based Approachmentioning
confidence: 99%
See 1 more Smart Citation