1W.Du and Z.Zhan.Using randomized response techniques for pri- vacy-preserving data mining.Proceedings of the ninth ACM SIGKDD in- ternational conference on Knowledge discovery and datamining,pp. 505-510,2003.
2P.Samarati and L.Sweeney.Protecting privacy when disclosing in- fomlation:k-anonymity and itsenforcement through generalization and suppression.Proceedings of the IEEE Symposium on Research in Security and Privacy,pp.1-19,1998.
3V.S.Verykios,E.Bertino,I.N. Fovino,L.P.Provenza,Y.Saygin,and Y. Theodoridis.State-of-the-art in privacy preserving data mining.ACM SIGMOD Record,vol.33,pp.50- 57,2004.
4S.J.Rizvi and J.R.Haritsa.Maintaining data privacy in association rule mining.Proceedings of the 28th international conference on Very Large Data Bases-Volume 28,pp.682-693,2002.
5S.Agrawal,V.Krishnan,and J.P,.Haritsa.On addressing efficiency concerns in privacy-preserving mining.Proc.of 9th Intl.Conf.on Database Systems for Advanced Applications(DASFAA),pp. 113 124,2004.
6Si.Warner.Randomized response:A survey technique for eliminating evasive answer bias Journal of the American Statistical Association,vol.60, pp. 63 -69,1965.