Return to Article Details An approach of Privacy Preserving Data mining using Perturbation & Cryptography Technique Download Download PDF