2010 International Conference on Information, Networking and Automation (ICINA) 2010
DOI: 10.1109/icina.2010.5636410
|View full text |Cite
|
Sign up to set email alerts
|

Research on privacy preserving classification data mining based on random perturbation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…This technique helps in accuracy of results but degrades the performance of data mining algorithm as the computational overhead is higher due to complexity of cryptography algorithms. Shamir's secret sharing [7], homomorphy encryption [11], secure multi party protocols [12], public key cryptosystems etc. algorithms are there in privacy preserving data mining.…”
Section: Cryptography Based Techniquementioning
confidence: 99%
“…This technique helps in accuracy of results but degrades the performance of data mining algorithm as the computational overhead is higher due to complexity of cryptography algorithms. Shamir's secret sharing [7], homomorphy encryption [11], secure multi party protocols [12], public key cryptosystems etc. algorithms are there in privacy preserving data mining.…”
Section: Cryptography Based Techniquementioning
confidence: 99%