Sciweavers

56 search results - page 12 / 12
» Encryption Techniques for Secure Database Outsourcing
Sort
View
KDD
2006
ACM
130views Data Mining» more  KDD 2006»
14 years 5 months ago
Efficient anonymity-preserving data collection
The output of a data mining algorithm is only as good as its inputs, and individuals are often unwilling to provide accurate data about sensitive topics such as medical history an...
Justin Brickell, Vitaly Shmatikov