![](https://secure.gravatar.com/avatar/75281e874481fe77d6720bbc6079d695.jpg?s=120&d=mm&r=g)
One of our Researcher needs the following article for her research work. If any one of you have access to this article, kindly arrange to send the copy. Pathak, F.AN.; Pandey, S.B.S., "Distributed changing neighbors k-secure sum protocol for secure multiparty computation," *Engineering (NUiCONE), 2013 Nirma University International Conference on* , vol., no., pp.1,3, 28-30 Nov. 2013 doi: 10.1109/NUiCONE.2013.6780073 keywords: {cryptographic protocols;data mining;data privacy;data mining;distributed changing neighbors k-secure sum protocol;private data;secure multiparty computation;zero leakage probability;Conferences;Cryptography;Data privacy;Privacy;Protocols;Ck-secure sum protocol;Dk-secure sum protocol;Privacy preservation;Secure multiparty computation (SMC);k-secure sum protocol}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6780073&isnumber=6780060 Pathak, F.AN.; Pandey, S.B.S., "An efficient method for privacy preserving data mining in secure multiparty computation," *Engineering (NUiCONE), 2013 Nirma University International Conference on* , vol., no., pp.1,3, 28-30 Nov. 2013 doi: 10.1109/NUiCONE.2013.6780075 keywords: {data mining;data privacy;protocols;SMC;data blocks;data privacy;data security;data segments;privacy preserving data mining;secure multiparty computation;Computational modeling;Conferences;Data privacy;Privacy;Protocols;Security;Data Mining;Privacy preservation;Secure multiparty computation (SMC);Secure sum protocol}, URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6780075&isnumber=6780060 Subhash Khode Chief Librarian MIT, Ujjain -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.