{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:36:16Z","timestamp":1743107776312,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030190620"},{"type":"electronic","value":"9783030190637"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-19063-7_73","type":"book-chapter","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:20:03Z","timestamp":1558549203000},"page":"937-949","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Secure Data Mining with Updating Database Using Fully Homomorphic Encryption"],"prefix":"10.1007","author":[{"given":"Yuri","family":"Yamamoto","sequence":"first","affiliation":[]},{"given":"Masato","family":"Oguchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,23]]},"reference":[{"key":"73_CR1","unstructured":"Zhao, Q., Bhowmick, S.S.: Association rule mining: a survey. Technical report, CAIS, Nanyang Technological University, Singapore, (2003116):1 (2003)"},{"issue":"6","key":"73_CR2","doi-asserted-by":"publisher","first-page":"866","DOI":"10.1109\/69.553155","volume":"8","author":"M-S Chen","year":"1996","unstructured":"Chen, M.-S., Han, J., Philip, S.Y.: Data mining: an overview from a database perspective. IEEE Trans. Knowl. Data Eng. 8(6), 866\u2013883 (1996)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"73_CR3","doi-asserted-by":"crossref","unstructured":"Imabayashi, H., Ishimaki, Y., Umayabara, A., Sato, H., Yamana, H.: Secure frequent pattern mining by fully homomorphic encryption with ciphertext packing. In: International Workshop on Data Privacy Management, pp. 181\u2013195. Springer (2016)","DOI":"10.1007\/978-3-319-47072-6_12"},{"key":"73_CR4","doi-asserted-by":"crossref","unstructured":"Imabayashi, H., Ishimaki, Y., Umayabara, A., Yamana, H.: Fast and space-efficient secure frequent pattern mining by FHE. In: 2016 IEEE International Conference on Big Data (Big Data), pp. 3983\u20133985, December 2016","DOI":"10.1109\/BigData.2016.7841083"},{"key":"73_CR5","unstructured":"Agrawal, R., Srikant, R., et\u00a0al.: Fast algorithms for mining association rules. In: Proceedings of the 20th International Conference on Very Large Data Bases, VLDB, vol. 1215, pp. 487\u2013499 (1994)"},{"key":"73_CR6","unstructured":"Cheung, D.W., Han, J., Ng, V.T., Wong, C.Y.: Maintenance of discovered association rules in large databases: an incremental updating technique. In: Proceedings of the Twelfth International Conference on Data Engineering, pp. 106\u2013114, February 1996"},{"key":"73_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C., et al.: Fully homomorphic encryption using ideal lattices. In: STOC, vol. 9, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"73_CR8","doi-asserted-by":"crossref","unstructured":"Rakesh, A., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: ACM SIGMOD Record, vol. 22, pp. 207\u2013216. ACM (1993)","DOI":"10.1145\/170036.170072"},{"key":"73_CR9","unstructured":"Cheung, D.W.-L., Ng, V.T.Y., Tam, B.W.: Maintenance of discovered knowledge: a case in multi-level association rules. In: KDD, vol. 96, pp. 307\u2013310 (1996)"},{"key":"73_CR10","doi-asserted-by":"crossref","unstructured":"Liu, J., Li, J., Xu, S., Fung, B.C.M.: Secure outsourced frequent pattern mining by fully homomorphic encryption. In: International Conference on Big Data Analytics and Knowledge Discovery, pp. 70\u201381. Springer (2015)","DOI":"10.1007\/978-3-319-22729-0_6"},{"key":"73_CR11","unstructured":"Shoup, V., Halevi, S.: HElib. \n                    http:\/\/shaih.github.io\/HElib\/index.html\n                    \n                  . Accessed Jan 2017"},{"key":"73_CR12","unstructured":"Open MPI. \n                    https:\/\/www.open-mpi.org\/\n                    \n                  . Accessed Jan 2017"},{"key":"73_CR13","volume-title":"Parallel Programming with MPI","author":"PS Pacheco","year":"1997","unstructured":"Pacheco, P.S.: Parallel Programming with MPI. Morgan Kaufmann, San Francisco (1997)"},{"key":"73_CR14","unstructured":"Boost. \n                    http:\/\/www.boost.org\/\n                    \n                  . Accessed Jan 2017"},{"key":"73_CR15","volume-title":"The Art of Concurrency: A Thread Monkey\u2019s Guide to Writing Parallel Applications","author":"C Breshears","year":"2009","unstructured":"Breshears, C.: The Art of Concurrency: A Thread Monkey\u2019s Guide to Writing Parallel Applications. O\u2019Reilly Media Inc., Sebastopol (2009)"},{"key":"73_CR16","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"Shai Halevi","year":"2014","unstructured":"Halevi, S., Shoup, V.: Algorithms in HElib. Cryptology ePrint Archive, Report 2014\/106 (2014). \n                    http:\/\/eprint.iacr.org\/2014\/106"},{"key":"73_CR17","doi-asserted-by":"crossref","unstructured":"Ishimaki, Y., Imabayashi, H., Yamana, H.: Private substring search on homomorphically encrypted data. In: IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/SMARTCOMP.2017.7947038"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 13th International Conference on Ubiquitous Information Management and Communication (IMCOM) 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-19063-7_73","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T01:11:53Z","timestamp":1564967513000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-19063-7_73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030190620","9783030190637"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-19063-7_73","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"23 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IMCOM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ubiquitous Information Management and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"imcom2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/imcom.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}