[1]
Zhan, J. et al. 2006. How To Construct Support Vector Machines Without Breaching Privacy. Studia Informatica. System and information technology. 7, 1-2 (Dec. 2006), 233–244.