2016 International Conference on ICT in Business Industry &Amp; Government (ICTBIG) 2016
DOI: 10.1109/ictbig.2016.7892647
|View full text |Cite
|
Sign up to set email alerts
|

Visual cryptography and concurrent slice-tracking with privacy preserving in data mining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…As can be seen that cryptography is a popular methodology for preserving privacy in different areas. Besides preserving privacy in data mining [22] or in cloud computing [23], it is also used to preserve privacy in social networks. As an illustration, Sakib and Huang [24] proposed a protocol based on elliptic curve cryptography to test whether two users in a social network are in an agreed distance range without disclosing their exact locations.…”
Section: Introductionmentioning
confidence: 99%
“…As can be seen that cryptography is a popular methodology for preserving privacy in different areas. Besides preserving privacy in data mining [22] or in cloud computing [23], it is also used to preserve privacy in social networks. As an illustration, Sakib and Huang [24] proposed a protocol based on elliptic curve cryptography to test whether two users in a social network are in an agreed distance range without disclosing their exact locations.…”
Section: Introductionmentioning
confidence: 99%