Skip to main content

Showing 1–3 of 3 results for author: M., J P P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.14607  [pdf

    cs.CR

    A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining

    Authors: Dhinakaran D, Joe Prathap P. M

    Abstract: Data mining is the way toward mining fascinating patterns or information from an enormous level of the database. Data mining additionally opens another risk to privacy and data security.One of the maximum significant themes in the research fieldis privacy-preserving DM (PPDM). Along these lines, the investigation of ensuring delicate information and securing sensitive mined snippets of data withou… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

  2. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

    Authors: Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B

    Abstract: With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  3. arXiv:0906.3956  [pdf

    cs.CR

    Analysis of the various key management algorithms and new proposal in the secure multicast communications

    Authors: Joe Prathap P M., V. Vasudevan

    Abstract: With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life.… ▽ More

    Submitted 22 June, 2009; originally announced June 2009.

    Comments: 8 pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS 2009, June Issue, Vol.2. No.1