Author of the publication

Distributed privacy preserving k-means clustering with additive secret sharing

, , , , and . PAIS '08: Proceedings of the 2008 international workshop on Privacy and anonymity in information society, page 3--11. New York, NY, USA, ACM, (2008)
DOI: http://doi.acm.org/10.1145/1379287.1379291

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SeFER: secure, flexible and efficient routing protocol for distributed sensor networks., , , , and . EWSN, page 246-255. IEEE, (2005)Distributed privacy preserving k-means clustering with additive secret sharing, , , , and . PAIS '08: Proceedings of the 2008 international workshop on Privacy and anonymity in information society, page 3--11. New York, NY, USA, ACM, (2008)A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks., and . ISCIS, page 157-163. Springer, (2011)A Role and Activity Based Access Control for Secure Healthcare Systems., , and . ISCIS, volume 363 of Lecture Notes in Electrical Engineering, page 93-103. Springer, (2015)Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks., and . ISCIS, volume 264 of Lecture Notes in Electrical Engineering, page 359-368. Springer, (2013)A resilient key predistribution scheme for multiphase wireless sensor networks., , and . ISCIS, page 375-380. IEEE, (2009)A Fair Multimedia Exchange Protocol., , and . ISCIS, volume 3733 of Lecture Notes in Computer Science, page 342-351. Springer, (2005)Practical and Secure E-Mail System (PractiSES)., and . ADVIS, volume 3261 of Lecture Notes in Computer Science, page 410-419. Springer, (2004)An optimistic fair e-commerce protocol for large e-goods., , and . ISCN, page 214-219. IEEE, (2006)A distributed key establishment scheme for wireless mesh networks using identity-based cryptography., , and . Q2SWinet, page 11-18. ACM, (2010)