{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:32:28Z","timestamp":1726003948660},"publisher-location":"Cham","reference-count":75,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017002"},{"type":"electronic","value":"9783030017019"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01701-9_5","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T12:03:08Z","timestamp":1545998588000},"page":"71-94","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure and Efficient Multi-Party Directory Publication for Privacy-Preserving Data Sharing"],"prefix":"10.1007","author":[{"given":"Katchaguy","family":"Areekijseree","sequence":"first","affiliation":[]},{"given":"Yuzhe","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Ju","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Iyengar","sequence":"additional","affiliation":[]},{"given":"Balaji","family":"Palanisamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"5_CR1","unstructured":"CommonWell. http:\/\/www.commonwellalliance.org\/"},{"key":"5_CR2","unstructured":"Cuda. https:\/\/en.wikipedia.org\/wiki\/cuda"},{"key":"5_CR3","unstructured":"Directive 95\/46\/EC of the European parliament and of the council"},{"key":"5_CR4","unstructured":"GaHIN. http:\/\/www.gahin.org\/"},{"key":"5_CR5","unstructured":"HealthEConnections. http:\/\/www.healtheconnections.org\/rhio"},{"key":"5_CR6","unstructured":"HiPAA. http:\/\/www.cms.hhs.gov\/hipaageninfo\/"},{"key":"5_CR7","unstructured":"http:\/\/health.usnews.com\/best-hospitals\/area\/new-york-ny\/specialty"},{"key":"5_CR8","unstructured":"Nextgate. http:\/\/www.nextgate.com\/our-products\/empi\/"},{"key":"5_CR9","unstructured":"NHIN Connect. http:\/\/www.connectopensource.org\/"},{"key":"5_CR10","unstructured":"NHIN. https:\/\/www.healthit.gov"},{"key":"5_CR11","unstructured":"OpenEMPI. http:\/\/www.openempi.org\/"},{"key":"5_CR12","unstructured":"Percy++\/PIR in C++. http:\/\/percy.sourceforge.net\/"},{"key":"5_CR13","unstructured":"pthread. https:\/\/en.wikipedia.org\/wiki\/posix_threads"},{"key":"5_CR14","unstructured":"SPARCS. http:\/\/www.health.ny.gov\/statistics\/sparcs\/"},{"key":"5_CR15","unstructured":"2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, 17\u201321 May 2015. IEEE Computer Society (2015)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer and extensions for faster secure computation. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, 4\u20138 November 2013, Berlin, Germany, pp. 535\u2013548 (2013)","DOI":"10.1145\/2508859.2516738"},{"key":"5_CR17","unstructured":"Bater, J., Elliott, G., Eggen, C., Goel, S., Kho, A.N., Duggan, J.: SMCQL: secure query processing for private data networks. CoRR, abs\/1606.06808 (2016)"},{"issue":"4","key":"5_CR18","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1007\/s00778-008-0129-7","volume":"18","author":"M Bawa","year":"2009","unstructured":"Bawa, M., Bayardo Jr., R.J., Agrawal, R., Vaidya, J.: Privacy-preserving indexing of documents on the network. VLDB J. 18(4), 837\u2013856 (2009)","journal-title":"VLDB J."},{"key":"5_CR19","doi-asserted-by":"publisher","first-page":"922","DOI":"10.1016\/B978-012722442-8\/50086-0","volume-title":"Proceedings 2003 VLDB Conference","author":"Mayank Bawa","year":"2003","unstructured":"Bawa, M., Bayardo Jr, R.J., Agrawal, R.: Privacy-preserving indexing of documents on the network. In: VLDB, pp. 922\u2013933 (2003)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Bellare, M., Hoang, V.T., Keelveedhi, S., Rogaway, P.: Efficient garbling from a fixed-key blockcipher. In: 2013 IEEE Symposium on Security and Privacy, SP 2013, 19\u201322 May 2013, Berkeley, CA, USA, pp. 478\u2013492. IEEE Computer Society (2013)","DOI":"10.1109\/SP.2013.39"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: Fairplaymp: a system for secure multi-party computation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 257\u2013266. ACM (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192\u2013206. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-88313-5_13"},{"key":"5_CR23","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of 19th USENIX Security Symposium, 11\u201313 August 2010, Washington, DC, USA, pp. 223\u2013240. USENIX Association (2010)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Cao, J., Rao, F., Bertino, E., Kantarcioglu, M.: A hybrid private record linkage scheme: Separating differentially private synopses from matching records. In: 31st IEEE International Conference on Data Engineering, ICDE 2015, 13\u201317 April 2015, Seoul, South Korea, pp. 1011\u20131022 (2015)","DOI":"10.1109\/ICDE.2015.7113352"},{"key":"5_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/978-3-642-27954-6_26","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"SG Choi","year":"2012","unstructured":"Choi, S.G., Hwang, K.W., Katz, J., Malkin, T., Rubenstein, D.: Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 416\u2013432. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-27954-6_26"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-642-28914-9_3","volume-title":"Theory of Cryptography","author":"SG Choi","year":"2012","unstructured":"Choi, S.G., Katz, J., Kumaresan, R., Zhou, H.-S.: On the security of the \u201cFree-XOR\u201d technique. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 39\u201353. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28914-9_3"},{"key":"5_CR27","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107337756","volume-title":"Secure Multiparty Computation and Secret Sharing","author":"R Cramer","year":"2015","unstructured":"Cramer, R., Damg\u00e5rd, I., Nielsen, J.B.: Secure Multiparty Computation and Secret Sharing. Cambridge University Press, Cambridge (2015)"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-40203-6_1","volume-title":"Computer Security \u2013 ESORICS 2013","author":"I Damg\u00e5rd","year":"2013","unstructured":"Damg\u00e5rd, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority \u2013 or: breaking the SPDZ limits. In: Crampton, J., Jajodia, S., Mayes, K. (eds.) ESORICS 2013. LNCS, vol. 8134, pp. 1\u201318. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40203-6_1"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Demmler, D., Dessouky, G., Koushanfar, F., Sadeghi, A.R., Schneider, T., Zeitouni, S.: Automated synthesis of optimized circuits for secure computation. In: Ray, I. Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 12\u20136 October 2015, Denver, CO, USA, pp. 1504\u20131517. ACM (2015)","DOI":"10.1145\/2810103.2813678"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Demmler, D., Schneider, T., Zohner, M.: Aby - a framework for efficient mixed-protocol secure two-party computation. In: Network and Distributed System Security Symposium, NDSS 2015, February 2015","DOI":"10.14722\/ndss.2015.23113"},{"key":"5_CR31","series-title":"Advances in Information Security","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-1-4615-1467-1_6","volume-title":"E-Commerce Security and Privacy","author":"W Du","year":"2001","unstructured":"Du, W., Atallah, M.J.: Protocols for secure remote database access with approximate matching. In: Ghosh, A.K. (ed.) E-Commerce Security and Privacy. ADIS, vol. 2, pp. 87\u2013111. Springer, Boston (2001). https:\/\/doi.org\/10.1007\/978-1-4615-1467-1_6"},{"key":"5_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/11761679_29","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"C Dwork","year":"2006","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486\u2013503. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11761679_29"},{"key":"5_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of Cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265\u2013284. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_14"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Eigner, F., Maffei, M., Pampaloni, F., Pryvalov, I., Kate, A.: Differentially private data aggregation with optimal utility. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, 8\u201312 December 2014, New Orleans, LA, USA, pp. 316\u2013325 (2014)","DOI":"10.1145\/2664243.2664263"},{"key":"5_CR35","volume-title":"Cryptography Engineering - Design Principles and Practical Applications","author":"N Ferguson","year":"2010","unstructured":"Ferguson, N., Schneier, B., Kohno, T.: Cryptography Engineering - Design Principles and Practical Applications. Wiley, Hoboken (2010)"},{"key":"5_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/978-3-642-54807-9_15","volume-title":"Compiler Construction","author":"M Franz","year":"2014","unstructured":"Franz, M., Holzer, A., Katzenbeisser, S., Schallhart, C., Veith, H.: CBMC-GC: an ANSI C compiler for secure two-party computations. In: Cohen, A. (ed.) CC 2014. LNCS, vol. 8409, pp. 244\u2013249. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54807-9_15"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: Aho, A.V. (ed.) Proceedings of the 19th Annual ACM Symposium on Theory of Computing, New York, New York, USA, pp. 218\u2013229. ACM (1987)","DOI":"10.1145\/28395.28420"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Henecka, W., K\u00f6gl, S. K., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: Tasty: tool for automating secure two-party computations. In: ACM CCS, pp. 451\u2013462 (2010)","DOI":"10.1145\/1866307.1866358"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Henry, R., Olumofin, F.G., Goldberg, I.: Practical PIR for electronic commerce. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, 17\u201321 October 2011, Chicago, Illinois, USA, pp. 677\u2013690 (2011)","DOI":"10.1145\/2046707.2046784"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium. USENIX Association (2011)","DOI":"10.1007\/978-3-642-25560-1_2"},{"key":"5_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-45146-4_9","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 145\u2013161. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_9"},{"key":"5_CR42","unstructured":"Jagom\u00e4gis, R.: Secrec: a privacy-aware programming language with applications in data mining"},{"key":"5_CR43","unstructured":"Jurczyk, P., Lu, J.J., Xiong, L., Cragan, J.D., Correa, A.: FRIL: a tool for comparative record linkage. In: American Medical Informatics Association Annual Symposium, AMIA 2008, 8\u201312 November 2008, Washington, DC, USA (2008)"},{"key":"5_CR44","first-page":"440","volume":"2008","author":"P Jurczyk","year":"2008","unstructured":"Jurczyk, P., Lu, J.J., Xiong, L., Cragan, J.D., Correa, A.: FRIL: a tool for comparative record linkage. AMIA Annu. Symp. Proc. 2008, 440 (2008)","journal-title":"AMIA Annu. Symp. Proc."},{"issue":"9","key":"5_CR45","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 16(9), 1026\u20131037 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-662-45608-8_27","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2014","author":"M Keller","year":"2014","unstructured":"Keller, M., Scholl, P.: Efficient, oblivious data structures for MPC. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 506\u2013525. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45608-8_27"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Automatically optimizing secure computation. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, 17\u201321 October 2011, Chicago, Illinois, USA, pp. 703\u2013714 (2011)","DOI":"10.1145\/2046707.2046786"},{"key":"5_CR48","unstructured":"Kreuter, B., Shelat, A., Mood, B., Butler, K.R.: PCF: a portable circuit format for scalable two-party secure computation. In: Proceedings of the 22th USENIX Security Symposium, 14\u201316 August 2013, Washington, DC, USA, pp. 321\u2013336 (2013)"},{"key":"5_CR49","unstructured":"Laud, P., Pankova, A.: Preprocessing-based verification of multiparty protocols with honest majority. IACR Cryptology ePrint Archive 2015:674 (2015)"},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: Liu et al. [53], p. 25 (2006)","DOI":"10.1109\/ICDE.2006.101"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, 15\u201320 April 2007, The Marmara Hotel, Istanbul, Turkey, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"5_CR52","doi-asserted-by":"crossref","unstructured":"Liu, C., Wang, X.S., Nayak, K., Huang, Y., Shi, E.: Oblivm: a programming framework for secure computation. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, 17\u201321 May 2015, San Jose, CA, USA [15], pp. 359\u2013376 (2015)","DOI":"10.1109\/SP.2015.29"},{"key":"5_CR53","unstructured":"Liu, L., Reuter, A. Whang, K., Zhang, J. (eds.): In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, 3\u20138 April 2006, Atlanta, GA, USA. IEEE Computer Society (2006)"},{"issue":"9","key":"5_CR54","doi-asserted-by":"publisher","first-page":"2424","DOI":"10.1109\/TKDE.2015.2411278","volume":"27","author":"YTL Liu","year":"2015","unstructured":"Liu, Y.T.L.: Privacy-preserving multi-keyword search in information networks. IEEE Trans. Knowl. Data Eng. 27(9), 2424\u20132437 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR55","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. In: Liu et al. [53], p. 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"issue":"3","key":"5_CR56","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1093\/ijlit\/eav012","volume":"23","author":"Alex B. Makulilo","year":"2015","unstructured":"Makulilo, A.B.: Asian Data Privacy Laws, Trade and Human Rights Perspective, By Graham Greenleaf, vol. 23, no. 3, pp. 322\u2013324. I. J. Law and Information Technology (2015)","journal-title":"International Journal of Law and Information Technology"},{"key":"5_CR57","unstructured":"Malkhi, D., Nisan, N., Pinkas, B., Sella, Y.: Fairplay - secure two-party computation system. In: Blaze, M. (ed.) USENIX Security Symposium, pp. 287\u2013302. USENIX (2004)"},{"key":"5_CR58","doi-asserted-by":"crossref","unstructured":"Martin, D.J., Kifer, D., Machanavajjhala, A., Gehrke, J., Halpern, J.Y.: Worst-case background knowledge for privacy-preserving data publishing. In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, 15\u201320 April 2007, The Marmara Hotel, Istanbul, Turkey, pp. 126\u2013135 (2007)","DOI":"10.1109\/ICDE.2007.367858"},{"key":"5_CR59","doi-asserted-by":"crossref","unstructured":"McCamant, S., Ernst, M. D.: Quantitative information flow as network flow capacity. In: Proceedings of the ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 7\u201313 June 2008, Tucson, AZ, USA, pp. 193\u2013205 (2008)","DOI":"10.1145\/1375581.1375606"},{"key":"5_CR60","unstructured":"Narayan, A., Haeberlen, A.: DJoin: differentially private join queries over distributed databases. In: OSDI, October 2012"},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"Pettai, M., Laud, P.: Combining differential privacy and secure multiparty computation. In: Proceedings of the 31st Annual Computer Security Applications Conference, 7\u201311 December 2015, Los Angeles, CA, USA, pp. 421\u2013430 (2015)","DOI":"10.1145\/2818000.2818027"},{"key":"5_CR62","unstructured":"Rabin, M.O.: How to exchange secrets with oblivious transfer. IACR Cryptology ePrint Archive 2005:187 (2005)"},{"key":"5_CR63","doi-asserted-by":"crossref","unstructured":"Rastogi, A., Hammer, M.A., Hicks, M.: Wysteria: a programming language for generic, mixed-mode multiparty computations. In: 2014 IEEE Symposium on Security and Privacy, SP 2014, 18\u201321 May 2014, Berkeley, CA, USA, pp. 655\u2013670. IEEE Computer Society (2014)","DOI":"10.1109\/SP.2014.48"},{"key":"5_CR64","unstructured":"Seward, J., Nethercote, N., Weidendorfer, J.: Valgrind 3.3-Advanced Debugging and Profiling for GNU\/Linux Applications. Network Theory Ltd., UK (2008)"},{"issue":"11","key":"5_CR65","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5_CR66","doi-asserted-by":"crossref","unstructured":"Songhori, E.M., Hussain, S.U., Sadeghi, A.R., Schneider, T., Koushanfar, F.: Tinygarble: highly compressed and scalable sequential garbled circuits. In: 2015 IEEE Symposium on Security and Privacy, SP 2015, 17\u201321 May 2015, San Jose, CA, USA [15], pp. 411\u2013428 (2015)","DOI":"10.1109\/SP.2015.32"},{"issue":"5","key":"5_CR67","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl.-Based Syst."},{"key":"5_CR68","doi-asserted-by":"crossref","unstructured":"Tang, Y., Liu, L., Iyengar, A., Lee, K., Zhang, Q.: e-PPI: locator service in information networks with personalized privacy preservation. In: IEEE 34th International Conference on Distributed Computing Systems, ICDCS 2014, 30 June\u20133 July 2014, Madrid, Spain, pp. 186\u2013197 (2014)","DOI":"10.1109\/ICDCS.2014.27"},{"key":"5_CR69","doi-asserted-by":"crossref","unstructured":"Tang, Y., Wang, T., Liu, L.: Privacy preserving indexing for ehealth information networks. In: CIKM, pp. 905\u2013914 (2011)","DOI":"10.1145\/2063576.2063707"},{"key":"5_CR70","unstructured":"Toth, C., Durham, E., Kantarcioglu, M., Xue, Y., Malin, B.: Soempi: A secure open enterprise master patient index software toolkit for private record linkage. In: AMIA Annual Symposium Proceedings, vol. 2014, p. 1105. American Medical Informatics Association (2014)"},{"key":"5_CR71","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 23\u201326 July 2002, Edmonton, Alberta, Canada, pp. 639\u2013644 (2002)","DOI":"10.1145\/775047.775142"},{"issue":"309","key":"5_CR72","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."},{"key":"5_CR73","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets (extended abstract). In: 27th Annual Symposium on Foundations of Computer Science, 27\u201329 October 1986, Toronto, Canada, pp. 162\u2013167. IEEE Computer Society (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"5_CR74","doi-asserted-by":"crossref","unstructured":"Zerr, S., Demidova, E., Olmedilla, D., Nejdl, W., Winslett, M., Mitra, S.: Zerber: r-confidential indexing for distributed documents. In: EDBT, pp. 287\u2013298 (2008)","DOI":"10.1145\/1353343.1353380"},{"key":"5_CR75","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Steele, A., Blanton, M.: PICCO: a general-purpose compiler for private distributed computation. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, 4\u20138 November 2013, Berlin, Germany, pp. 813\u2013826 (2013)","DOI":"10.1145\/2508859.2516752"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01701-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:14:19Z","timestamp":1573607659000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01701-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017002","9783030017019"],"references-count":75,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01701-9_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}