{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:30:40Z","timestamp":1725471040402},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540344292"},{"type":"electronic","value":"9783540344308"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11759355_43","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T10:32:37Z","timestamp":1158575557000},"page":"474-480","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Homomorphism for Delegation of the Computations"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Stepanov","sequence":"first","affiliation":[]},{"given":"Sergey","family":"Bezzateev","sequence":"additional","affiliation":[]},{"given":"Tae-Chul","family":"Jung","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","first-page":"169","volume-title":"Foundataions of Secure Computataion","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy Homorphisms. In: Foundataions of Secure Computataion, pp. 169\u2013179. Academic Press, London (1978)"},{"key":"43_CR2","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. MacWilliams","year":"1997","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. Elsevier Science Publishers B.V., Amsterdam (1997)"},{"key":"43_CR3","first-page":"117","volume-title":"Advances in Cryptology-Eurocrypt 1987","author":"E. Brickell","year":"1988","unstructured":"Brickell, E., Yacobi, Y.: On Privacy Homoorphisms. In: Advances in Cryptology-Eurocrypt 1987, pp. 117\u2013125. Springer, Heidelberg (1988)"},{"issue":"5","key":"43_CR4","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0020-0190(96)00170-6","volume":"60","author":"J. Domingo-Ferrer","year":"1996","unstructured":"Domingo-Ferrer, J.: New Privacy Homomorphism and Applications. Information Processing Letters\u00a060(5), 277\u2013282 (1996)","journal-title":"Information Processing Letters"},{"key":"43_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-45811-5_37","volume-title":"Information Security","author":"J. Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J.: Provably Secure Additive and Multiplicative Privacy Homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol.\u00a02433, pp. 471\u2013483. Springer, Heidelberg (2002)"},{"key":"43_CR6","unstructured":"Bao, F.: Cryptanalysis of a Provable Secure Additive and Multiplicative Privacy Homomorphism. In: ICSD 2003 (2003)"},{"key":"43_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/10958513_18","volume-title":"Information Security","author":"D. Wagner","year":"2003","unstructured":"Wagner, D.: Cryptanalysis of an Algebraic Privacy Homomorphism. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol.\u00a02851, pp. 234\u2013239. Springer, Heidelberg (2003)"},{"key":"43_CR8","unstructured":"Cheon, J.H., Nam, H.S.: A Cryptanalysis of the Original Domingo-Ferrer\u2019s Algebraic Privacy Homomorphism, \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"43_CR9","unstructured":"Hopson, K.C., Ingram, S.E.: Developing Professional Java Applets, Sams.net (June 1, 1996)"},{"key":"43_CR10","volume-title":"Programming and Deploying Java Mobile Agents with Aglets","author":"D.B. Lange","year":"1998","unstructured":"Lange, D.B., Oshima, M.: Programming and Deploying Java Mobile Agents with Aglets, 1st edn. Addison-Wesley Professional, Reading (1998)","edition":"1"},{"issue":"10","key":"43_CR11","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/2.237456","volume":"26","author":"M. Weiser","year":"1993","unstructured":"Weiser, M.: Hot topics-ubiquitous computing. Computer\u00a026(10), 71\u201372 (1993)","journal-title":"Computer"},{"issue":"8","key":"43_CR12","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A Survey on Sensor Networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"}],"container-title":["Lecture Notes in Computer Science","Next Generation Teletraffic and Wired\/Wireless Advanced Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11759355_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T12:57:35Z","timestamp":1539262655000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11759355_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540344292","9783540344308"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11759355_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}