ICISC   2004 International Conference on Information Security and Cryptology
Wall of Fame | Most Viewed ICISC-2004 Paper
173views Cryptology» more  ICISC 2004»
13 years 8 months ago
On Private Scalar Product Computation for Privacy-Preserving Data Mining
In mining and integrating data from multiple sources, there are many privacy and security issues. In several different contexts, the security of the full privacy-preserving data mi...
Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mi...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source173
2Download preprint from source169
3Download preprint from source147
4Download preprint from source146
5Download preprint from source132
6Download preprint from source127
7Download preprint from source122
8Download preprint from source120
9Download preprint from source120
10Download preprint from source112
11Download preprint from source110
12Download preprint from source108
13Download preprint from source99
14Download preprint from source96
15Download preprint from source76