共 10 条
[1]
Agrawal D., 2001, Proceedings of the 20th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, P247, DOI DOI 10.1145/375551.375602
[2]
Agrawal S, 2004, LECT NOTES COMPUT SC, V2973, P113
[3]
[Anonymous], 2000, Privacy-preserving data mining, DOI DOI 10.1145/342009.335438
[4]
Clifton C., 2000, Journal of Computer Security, V8, P281
[5]
Clifton C, 2003, P IEEE ICDM WORKSH P, P3
[6]
Clifton C., 2002, SIGKDD EXPLOR NEWSLE, V4, P28, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[7]
DU W, 2003, P 9 ACM SIGKDD INT C, P505
[8]
Johnsten T., 2002, P IEEE INT C PRIVAC, P9
[9]
Rizvi S. J., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P682
[10]
VAIDYA J, 2004, P 4 SIAM INT C DAT M