×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [commutative encryption]
Privacy Preservation Issues in Association Rule Mining in Horizontally Partitioned Databases
742 views
Secure Mining of Association Rules in Horizontally Distributed Databases
681 views
SECURITY AND VERIFICATION Lecture 1: Why to prove cryptography? The origins of provable cryptography Tamara Rezk INDES TEAM, INRIA January 3 rd, 2012
215 views
Tools for Privacy Preserving Distributed Data Mining By Michael Holmes
212 views
Cross-Domain Privacy-Preserving Collaborative Firewall Optimization Fei Chen Computer Science and Engineering Michigan State University Joint work with
214 views
Cross-Domain Privacy-Preserving Collaborative Firewall Optimization
26 views
1 Private Resource Pairing Joseph Calandrino Department of Computer Science University of Virginia August 10, 2005
220 views