Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A multi-party privacy-preserving record linkage method based on improved secondary encoding
by
Han, Shumin
, Shen, Derong
, Wang, Yizi
, Wang, Chuang
in
Big Data
/ Coding
/ Computational efficiency
/ Computer Imaging
/ Computer Science
/ Confidentiality
/ Consistent hashing
/ Data encryption
/ Data integrity
/ Data transmission
/ Database Management
/ Efficiency
/ Geometric mean
/ Hash based algorithms
/ Machine Learning
/ Methods
/ Original Paper
/ Pattern Recognition and Graphics
/ Privacy
/ Privacy preserving
/ Product development
/ Record linkage
/ Secondary encoding
/ Security
/ Software Engineering/Programming and Operating Systems
/ Systems and Data Security
/ Theory of Computation
/ Vision
/ Workloads
2025
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A multi-party privacy-preserving record linkage method based on improved secondary encoding
by
Han, Shumin
, Shen, Derong
, Wang, Yizi
, Wang, Chuang
in
Big Data
/ Coding
/ Computational efficiency
/ Computer Imaging
/ Computer Science
/ Confidentiality
/ Consistent hashing
/ Data encryption
/ Data integrity
/ Data transmission
/ Database Management
/ Efficiency
/ Geometric mean
/ Hash based algorithms
/ Machine Learning
/ Methods
/ Original Paper
/ Pattern Recognition and Graphics
/ Privacy
/ Privacy preserving
/ Product development
/ Record linkage
/ Secondary encoding
/ Security
/ Software Engineering/Programming and Operating Systems
/ Systems and Data Security
/ Theory of Computation
/ Vision
/ Workloads
2025
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A multi-party privacy-preserving record linkage method based on improved secondary encoding
by
Han, Shumin
, Shen, Derong
, Wang, Yizi
, Wang, Chuang
in
Big Data
/ Coding
/ Computational efficiency
/ Computer Imaging
/ Computer Science
/ Confidentiality
/ Consistent hashing
/ Data encryption
/ Data integrity
/ Data transmission
/ Database Management
/ Efficiency
/ Geometric mean
/ Hash based algorithms
/ Machine Learning
/ Methods
/ Original Paper
/ Pattern Recognition and Graphics
/ Privacy
/ Privacy preserving
/ Product development
/ Record linkage
/ Secondary encoding
/ Security
/ Software Engineering/Programming and Operating Systems
/ Systems and Data Security
/ Theory of Computation
/ Vision
/ Workloads
2025
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A multi-party privacy-preserving record linkage method based on improved secondary encoding
Journal Article
A multi-party privacy-preserving record linkage method based on improved secondary encoding
2025
Request Book From Autostore
and Choose the Collection Method
Overview
The multi-party Privacy-Preserving Record Linkage (PPRL) aims to identify and match the same entity across different parties’ data sources while ensuring that all private data remains protected and undisclosed, except for the final matching results shared among the parties. The previously proposed a multi-party PPRL method based on secondary encoding suffers from issues related to the number of data splits and load balancing, which impact computational efficiency and linkage quality. We propose an extended approach—a multi-party PPRL method based on improved secondary encoding(ISE_PPRL). By adopting a rational data split strategy and participant work strategy, and incorporating the geometric mean and consistent hashing algorithm, this method overcomes the traditional limitation where each party could only process a single data split. It effectively mitigates potential collusion risks among data splits, enhances security, optimizes computational efficiency, and maintains linkage quality. Experimental results demonstrate that this method exhibits significant advantages in improving security, enhancing computational efficiency, and maintaining linkage quality.
Publisher
Springer International Publishing,Springer Nature B.V,Springer
This website uses cookies to ensure you get the best experience on our website.