Back to Results
First PageMeta Content



Practical Secure Decision Tree Learning in a Teletreatment Application Sebastiaan de Hoogh1 , Berry Schoenmakers2 , Ping Chen3 , and Harm op den Akker4 1
Add to Reading List

Document Date: 2014-02-15 11:15:15


Open Document

File Size: 377,29 KB

Share Result on Facebook

Company

Zp / /

Currency

pence / /

/

Event

FDA Phase / /

IndustryTerm

data mining techniques / dot products / privacy preserving data mining / cryptographic protocols / basic data mining operations / time consuming protocols / greedy algorithm / similar protocols / secure solutions / dot product / party protocols / data mining / mining / secure dot product / data mining algorithms / multiparty protocols / secure multiparty protocol / recursive protocol / cryptographic solution / /

Product

SID3 / ID3 / SID3S / /

Technology

SID3 protocol / recursive SID3 protocol / encryption / Cryptography / resulting protocols / wellknown ID3 algorithm / underlying protocols / underlying ID3 algorithm / ID3 algorithm / smartphone / data mining algorithms / main ID3 protocol / two party protocols / greedy algorithm / secure multiparty protocol / Condensation / 4 Secure ID3 Protocol / recursive ID3 algorithm / data mining / decision tree Algorithm / using threshold homomorphic encryption / recursive protocol / time consuming protocols / secure ID3 protocols / /

SocialTag