{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T16:30:47Z","timestamp":1743006647003,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030314996"},{"type":"electronic","value":"9783030315009"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31500-9_1","type":"book-chapter","created":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T23:26:53Z","timestamp":1568935613000},"page":"3-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["PINFER: Privacy-Preserving Inference"],"prefix":"10.1007","author":[{"given":"Marc","family":"Joye","sequence":"first","affiliation":[]},{"given":"Fabien","family":"Petitcolas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,20]]},"reference":[{"key":"1_CR1","volume-title":"Learning From Data: A Short Course","author":"YS Abu-Mostafa","year":"2012","unstructured":"Abu-Mostafa, Y.S., Magdon-Ismail, M., Lin, H.T.: Learning From Data: A Short Course. AMLbook.com, New York (2012). http:\/\/amlbook.com"},{"issue":"2","key":"1_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/335191.335438","volume":"29","author":"R Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. ACM SIGMOD Rec. 29(2), 439\u2013450 (2000). https:\/\/doi.org\/10.1145\/335191.335438","journal-title":"ACM SIGMOD Rec."},{"doi-asserted-by":"publisher","unstructured":"Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: MM&Sec 2006, pp. 146\u2013151. ACM (2006). https:\/\/doi.org\/10.1145\/1161366.1161393","key":"1_CR3","DOI":"10.1145\/1161366.1161393"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1016\/j.jbi.2014.04.003","volume":"50","author":"JW Bos","year":"2014","unstructured":"Bos, J.W., Lauter, K., Naehrig, M.: Private predictive analysis on encrypted medical data. J. Biomed. Inf. 50, 234\u2013243 (2014). https:\/\/doi.org\/10.1016\/j.jbi.2014.04.003","journal-title":"J. Biomed. Inf."},{"doi-asserted-by":"publisher","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: NDSS 2015. The Internet Society (2015). https:\/\/doi.org\/10.14722\/ndss.2015.23241","key":"1_CR5","DOI":"10.14722\/ndss.2015.23241"},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damg\u00e5rd","year":"2008","unstructured":"Damg\u00e5rd, I., Geisler, M., Kr\u00f8igaard, M.: Homomorphic encryption and secure comparison. Int. J. Appl. Cryptogr. 1(1), 22\u201331 (2008). https:\/\/doi.org\/10.1504\/IJACT.2008.017048","journal-title":"Int. J. Appl. Cryptogr."},{"issue":"4","key":"1_CR7","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1504\/IJACT.2009.028031","volume":"1","author":"I Damg\u00e5rd","year":"2009","unstructured":"Damg\u00e5rd, I., Geisler, M., Kr\u00f8igaard, M.: A correction to \u2018efficient and secure comparison for on-line auctions\u2019. Int. J. Appl. Cryptogr. 1(4), 323\u2013324 (2009). https:\/\/doi.org\/10.1504\/IJACT.2009.028031","journal-title":"Int. J. Appl. Cryptogr."},{"unstructured":"Dwork, C., Feldman, V.: Privacy-preserving prediction. In: COLT 2018. PMLR, vol. 75, pp. 1693\u20131702. PMLR (2018). http:\/\/proceedings.mlr.press\/v75\/dwork18a\/dwork18a.pdf","key":"1_CR8"},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-642-03168-7_14","volume-title":"Privacy Enhancing Technologies","author":"Z Erkin","year":"2009","unstructured":"Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I., Toft, T.: Privacy-preserving face recognition. In: Goldberg, I., Atallah, M.J. (eds.) PETS 2009. LNCS, vol. 5672, pp. 235\u2013253. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03168-7_14"},{"unstructured":"Glorot, X., Bordes, A., Bengjio, Y.: Deep sparse rectifier neural networks. In: AISTAT 2011. PMLR, vol. 15, pp. 315\u2013323. PMLR (2011). http:\/\/proceedings.mlr.press\/v15\/glorot11a\/glorot11a.pdf","key":"1_CR10"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11496618_9","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"B Goethals","year":"2005","unstructured":"Goethals, B., Laur, S., Lipmaa, H., Mielik\u00e4inen, T.: On private scalar product computation for privacy-preserving data mining. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 104\u2013120. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496618_9"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270\u2013299 (1984). https:\/\/doi.org\/10.1016\/0022-0000(84)90070-9","journal-title":"J. Comput. Syst. Sci."},{"key":"1_CR13","series-title":"Springer Series in Statistics","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The Elements of Statistical Learning","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.: The Elements of Statistical Learning. Springer Series in Statistics, 2nd edn. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-84858-7","edition":"2"},{"unstructured":"Hubara, I., Courbariaux, M., Soudry, D., El-Yaniv, R., Bengio, Y.: Binarized neural networks. In: NISP 2016, pp. 4107\u20134115. Curran Associates, Inc. http:\/\/papers.nips.cc\/paper\/6573-binarized-neural-networks.pdf","key":"1_CR14"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-95729-6_16","volume-title":"Data and Applications Security and Privacy XXXII","author":"M Joye","year":"2018","unstructured":"Joye, M., Salehi, F.: Private yet efficient decision tree evaluation. In: Kerschbaum, F., Paraboschi, S. (eds.) DBSec 2018. LNCS, vol. 10980, pp. 243\u2013259. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-95729-6_16"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"e19","DOI":"10.2196\/medinform.8805","volume":"6","author":"M Kim","year":"2018","unstructured":"Kim, M., Song, Y., Wang, S., Xia, Y., Jiang, X.: Secure logistic regression based on homomorphic encryption: design and evaluation. JMIR Med. Inform. 6(2), e19 (2018). https:\/\/doi.org\/10.2196\/medinform.8805","journal-title":"JMIR Med. Inform."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"Y Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 36\u201354. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_3"},{"doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: SecureML: A system for scalable privacy-preserving machine learning. In: IEEE S&P 2017, pp. 19\u201338. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.12","key":"1_CR18","DOI":"10.1109\/SP.2017.12"},{"unstructured":"Tram\u00e8r, F., Zhang, F., Juels, A., Reiter, M.K., Ristenpart, T.: Stealing machine learning models via prediction APIs. In: USENIX Security 2016, pp. 601\u2013618. USENIX Association (2016). https:\/\/www.usenix.org\/system\/files\/conference\/usenixsecurity16\/sec16_paper_tramer.pdf","key":"1_CR19"},{"doi-asserted-by":"publisher","unstructured":"Veugen, T.: Improving the DGK comparison protocol. In: WIFS 2012, pp. 49\u201354. IEEE (2012). https:\/\/doi.org\/10.1109\/WIFS.2012.6412624","key":"1_CR20","DOI":"10.1109\/WIFS.2012.6412624"},{"doi-asserted-by":"publisher","unstructured":"Zhang, J., Wang, X., Yiu, S.M., Jiang, Z.L., Li, J.: Secure dot product of outsourced encrypted vectors and its application to SVM. In: SCC@AsiaCCS 2017, pp. 75\u201382. ACM (2017). https:\/\/doi.org\/10.1145\/3055259.3055270","key":"1_CR21","DOI":"10.1145\/3055259.3055270"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31500-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:01:58Z","timestamp":1726790518000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31500-9_1"}},"subtitle":["Logistic Regression, Support Vector Machines, and More, over Encrypted Data"],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030314996","9783030315009"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31500-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Luxembourg","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2019.uni.lu\/workshops\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}