Privacy-Preserving Data Mining Applications in the Malicious Model | IEEE Conference Publication | IEEE Xplore