Sciweavers

31 search results - page 7 / 7
» Efficient Identity-Based Encryption with Tight Security Redu...
Sort
View
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 6 months ago
Collusion-resistant anonymous data collection method
The availability and the accuracy of the data dictate the success of a data mining application. Increasingly, there is a need to resort to on-line data collection to address the p...
Mafruz Zaman Ashrafi, See-Kiong Ng