Login / Signup
Secure Computation with Differentially Private Access Patterns.
Sahar Mazloom
S. Dov Gordon
Published in:
CCS (2018)
Keyphrases
</>
access patterns
differentially private
prefetching
differential privacy
web logs
file system
web usage mining
web users
data mining
text mining
data mining techniques
cloud computing
privacy preserving
web mining