Art
J-GLOBAL ID:201602233860463901   Reference number:16A1366693

Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption

準同型暗号による分散データソースを用いるプライバシー保護ロジスティック回帰
Author (4):
Material:
Volume: E99.D  Issue:Page: 2079-2089(J-STAGE)  Publication year: 2016 
JST Material Number: U0469A  ISSN: 1745-1361  Document type: Article
Article type: 原著論文  Country of issue: Japan (JPN)  Language: ENGLISH (EN)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.

Author keywords (9):
JST classification (3):
JST classification
Category name(code) classified by JST.
Data protection  ,  Code theory  ,  Other information processing 
Reference (35):
  • [1] UCI Machine Learning Repository, http://archive.ics.uci.edu/ml
  • [2] Adult dataset. https://archive.ics.uci.edu/ml/machine-learning-databases/adult/adult.names
  • [3] Breast Cancer. https://archive.ics.uci.edu/ml/machine-learning-databases/breast-cancer-wisconsin/
  • [4] Pima dataset. https://archive.ics.uci.edu/ml/machine-learning-databases/pima-indians-diabetes/
  • [5] Y. Aono, X. Boyen, L.T. Phong, and L. Wang, “Key-private proxy re-encryption under LWE,” G. Paul and S. Vaudenay, editors, Progress in Cryptology-INDOCRYPT 2013, vol.8250 of Lecture Notes in Computer Science, pp.1-18. Springer, 2013.
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.

Return to Previous Page