共 37 条
[1]
Afshari Doryaneh Hossien, 2017, J SOFT COMPUTING APP, V1, P44, DOI [10.5899/2017/jsca-00073, DOI 10.5899/2017/JSCA-00073]
[2]
Agrawal D., 2001, Proc. 20th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[3]
Agrawal R., P 20 INT C VERY LARG, DOI DOI 10.1055/S-2007-996789
[4]
[Anonymous], 2006, IEEE INFOCOM 2006 25
[5]
[Anonymous], 2007, P 5 ACM USENIX INT M
[6]
[Anonymous], 2018, The Guardian
[7]
Bakshy E, 2011, P 4 ACM INT C WEB SE, DOI DOI 10.1145/1935826.1935845
[8]
Boyd Kendrick, 2013, Machine Learning and Knowledge Discovery in Databases. European Conference, ECML PKDD 2013. Proceedings: LNCS 8190, P451, DOI 10.1007/978-3-642-40994-3_29
[9]
Privacy-preserving distributed mining of association rules using Elliptic-curve cryptosystem and Shamir's secret sharing scheme
[J].
SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES,
2017, 42 (12)
:1997-2007
[10]
Chakaravarthy V., 2009, P 12 INT C DATABASE, P276