{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T02:10:07Z","timestamp":1738289407892,"version":"3.35.0"},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387096988"},{"type":"electronic","value":"9780387096995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09699-5_3","type":"book-chapter","created":{"date-parts":[[2008,7,16]],"date-time":"2008-07-16T18:12:54Z","timestamp":1216231974000},"page":"33-46","source":"Crossref","is-referenced-by-count":7,"title":["Enhancing Privacy in Remote Data Classification"],"prefix":"10.1007","author":[{"given":"A.","family":"Piva","sequence":"first","affiliation":[]},{"given":"C.","family":"Orlandi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Caini","sequence":"additional","affiliation":[]},{"given":"T.","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Barni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: SIGMOD \u201900: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Barker, E., Barker, W., Burr, W., Polk, W., Smid, M.: Recommendation for Key Management\u2013Part 1: General. NIST Special Publication pp. 800\u201357 (2005)","DOI":"10.6028\/NIST.SP.800-57p1"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: MM&Sec \u201906: Proceeding of the 8th Workshop on Multimedia and Security, pp. 146\u2013151 (2006)","DOI":"10.1145\/1161366.1161393"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Minimal-latency secure function evaluation. Proc. of EUROCRYPT00, LNCS pp. 335\u2013350 (2000)","DOI":"10.1007\/3-540-45539-6_23"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bishop, C.: Neural Networks for Pattern Recognition. Oxford University Press (1995)","DOI":"10.1201\/9781420050646.ptb6"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Chang, Y., Lu, C.: Oblivious polynomial evaluation and oblivious neural learning. Theoretical Computer Science 341(1), 39\u201354 (2005)","DOI":"10.1016\/j.tcs.2005.03.049"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Comesana, P., Perez-Freire, L., Perez-Gonzalez, F.: Blind newton sensitivity attack. Information Security, IEE Proceedings 153(3), 115\u2013125 (2006)","DOI":"10.1117\/12.642721"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Damgr\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Public Key Cryptography, pp. 119\u2013136 (2001)","DOI":"10.1007\/3-540-44586-2_9"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (2004)","DOI":"10.21236\/ADA465464"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-36504-4_10","volume":"2357","author":"P. Fouque","year":"2003","unstructured":"Fouque, P., Stern, J., Wackers, G.: CryptoComputing with rationals. Financial-Cryptography.-6th-International-Conference, Lecture-Notesin-Computer-Science 2357, 136\u201346 (2003)","journal-title":"Lecture-Notesin-Computer-Science"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S.,Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC \u201987: Proceedings of the twentieth annual ACM symposium on Theory of computing, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"3_CR12","unstructured":"Gorman, P., et al.: UCI machine learning repository (1988). URL http:\/\/archive.ics.uci.edu\/ml\/"},{"issue":"5","key":"3_CR13","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K. Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multilayer feedforward networks are universal approximators. Neural Netw. 2(5), 359\u2013366 (1989)","journal-title":"Neural Netw."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Jha, S., Kruger, L., McDaniel, P.: Privacy Preserving Clustering. 10th ESORICS (2005)","DOI":"10.1007\/11555827_23"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Kalker, T., Linnartz, J.P.M.G., van Dijk,M.:Watermark estimation through detector analysis. In: ICIP98, vol. I, pp. 425\u2013429. Chicago, IL, USA (1998)","DOI":"10.1109\/ICIP.1998.723516"},{"key":"3_CR16","unstructured":"Kantarcioglu, M., Vaidya, J.: Privacy preserving naive bayes classifier for horizontally partitioned data. In: In IEEE Workshop on Privacy Preserving Data Mining (2003)"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Lapedes, A., Farber, R.: How neural nets work. Neural information processing systems pp. 442\u2013456 (1988)","DOI":"10.1142\/9789814434102_0012"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Laur, S., Lipmaa, H., Mielik\u00e4inen, T.: Cryptographically private support vector machines. In: KDD \u201906: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge discovery and data mining, pp. 618\u2013624 (2006)","DOI":"10.1145\/1150402.1150477"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In Advances in Cryptology - CRYPTO \u201900, volume 1880 of Lecture Notes in Computer Science 1880, 36\u201354 (2000)","DOI":"10.1007\/3-540-44598-6_3"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Pailler, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt\u201999, Lecture Notes is Computer Science vol. 1592, pp. 223\u2013238. Springer-Verlag (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"3_CR21","unstructured":"Rajkovic, V., et al.: UCI machine learning repository (1997). URL http:\/\/archive.ics.uci.edu\/ml\/"},{"key":"3_CR22","first-page":"318","volume":"1","author":"D. Rumelhart","year":"1986","unstructured":"Rumelhart, D., Hinton, G., Williams, R.: Learning internal representations by error propogation. Parallel distributed processing: Explorations in the microstructure of cognition 1, 318\u2013362 (1986)","journal-title":"Parallel distributed processing: Explorations in the microstructure of cognition"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Sander, T., Young, A., Yung, M.: Non-Interactive CryptoComputing For NC 1. IEEE Symposium on Foundations of Computer Science pp. 554\u2013567 (1999)","DOI":"10.1109\/SFFCS.1999.814630"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Yang, Z., Wright, R.N.: Improved privacy-preserving bayesian network parameter learning on vertically partitioned data. In: ICDEW \u201905: Proceedings of the 21st International Conference on Data Engineering Workshops, p. 1196 (2005)","DOI":"10.1109\/ICDE.2005.230"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: IEEE FOCS\u201986 - Foundations of Computer Science, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Proceedings of The Ifip Tc 11 23rd International Information Security Conference"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09699-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T01:30:55Z","timestamp":1738287055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09699-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387096988","9780387096995"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09699-5_3","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}