{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:42:30Z","timestamp":1743144150271,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030558734"},{"type":"electronic","value":"9783030558741"}],"license":[{"start":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T00:00:00Z","timestamp":1598054400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,22]],"date-time":"2020-08-22T00:00:00Z","timestamp":1598054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55874-1_112","type":"book-chapter","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T11:52:51Z","timestamp":1620042771000},"page":"1129-1136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Approximating Eigenvectors with Fixed-Point Arithmetic: A Step Towards Secure Spectral Clustering"],"prefix":"10.1007","author":[{"given":"Lisa","family":"Steverink","sequence":"first","affiliation":[]},{"given":"Thijs","family":"Veugen","sequence":"additional","affiliation":[]},{"given":"Martin B. van","family":"Gijzen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,22]]},"reference":[{"key":"112_CR1","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP - a secure multi-party computation system. In: ACM CCS (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"112_CR2","doi-asserted-by":"crossref","unstructured":"Erkin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Privacy-preserving user clustering in a social network. In: IEEE International Workshop on Information Forensics and Security (2009)","DOI":"10.1109\/WIFS.2009.5386476"},{"key":"112_CR3","unstructured":"Golub, G., Van Loan, C.: Matrix Computations. Johns Hopkins University Press (1996)"},{"key":"112_CR4","unstructured":"Hoogh de, S.J.A.: Design of large scale applications of secure multiparty computation: secure linear programming. Ph.D. thesis, Eindhoven University of Technology (2012)"},{"key":"112_CR5","unstructured":"Jakobsen, T.: Secure multi-party computation on integers (2006)"},{"key":"112_CR6","unstructured":"Lichman, M.: UCI machine learning repository. http:\/\/archive.ics.uci.edu\/ml (2013)"},{"key":"112_CR7","doi-asserted-by":"crossref","unstructured":"Liedel, M.: Secure distributed computation of the square root and applications. In: International Conference on Information Security Practice and Experience, pp. 277\u2013288. Springer (2012)","DOI":"10.1007\/978-3-642-29101-2_19"},{"key":"112_CR8","doi-asserted-by":"crossref","unstructured":"Nikolaenko, V., Ioannidis, S., Weinsberg, U., Joye, M., Taft, N., Boneh, D.: Privacy-preserving matrix factorization. In: Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security, pp. 801\u2013812. ACM (2013)","DOI":"10.1145\/2508859.2516751"},{"key":"112_CR9","unstructured":"Paige, C.C.: The computation of eigenvalues and eigenvectors of very large sparse matrices. Ph.D. thesis, University of London (1971)"},{"key":"112_CR10","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of Eurocrypt 1999, Lecture Notes in Computer Science, vol. 1592, pp. 223\u2013238. Springer-Verlag (1999). citeseer.ist.psu.edu\/article\/paillier99publickey.html","DOI":"10.1007\/3-540-48910-X_16"},{"key":"112_CR11","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/0377-0427(87)90125-7","volume":"20","author":"PJ Rousseeuw","year":"1987","unstructured":"Rousseeuw, P.J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of computational and applied mathematics 20, 53\u201365 (1987)","journal-title":"Journal of computational and applied mathematics"},{"key":"112_CR12","doi-asserted-by":"crossref","unstructured":"Sharma, S., Chen, K.: Privategraph: a cloud-centric system for spectral analysis of large encrypted graphs. In: IEEE 37th International Conference on Distributed Computing Systems, pp. 2507\u20132510. IEEE Computer Society (2017)","DOI":"10.1109\/ICDCS.2017.189"},{"key":"112_CR13","doi-asserted-by":"crossref","unstructured":"Sharma, S., Powers, J., Chen, K.: Privacy-preserving spectral analysis of large graphs in public clouds. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 71\u201382. ACM (2016)","DOI":"10.1145\/2897845.2897857"},{"key":"112_CR14","volume-title":"Secure spectral clustering: the approximation of eigenvectors in the integer domain","author":"ML Steverink","year":"2017","unstructured":"Steverink, M.L.: Secure spectral clustering: the approximation of eigenvectors in the integer domain. Master\u2019s thesis, Delft University of Technology (2017). http:\/\/resolver.tudelft.nl\/uuid:284fc7f2-440d-4435-ae04-fea83d12c12f"},{"key":"112_CR15","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1504\/IJACT.2014.062738","volume":"3","author":"T Veugen","year":"2014","unstructured":"Veugen, T.: Encrypted integer division and secure comparison. International Journal of Applied Cryptography 3, 166\u2013180 (2014)","journal-title":"International Journal of Applied Cryptography"},{"issue":"4","key":"112_CR16","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U Von Luxburg","year":"2007","unstructured":"Von Luxburg, U.: A tutorial on spectral clustering. Statistics and computing 17(4), 395\u2013416 (2007)","journal-title":"Statistics and computing"},{"issue":"3","key":"112_CR17","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1109\/TITB.2012.2227146","volume":"17","author":"HJ Yu","year":"2013","unstructured":"Yu, H.J., Huang, D.S.: Graphical representation for DNA sequences via joint diagonalization of matrix pencil. IEEE Journal of Biomedical and Health Informatics 17(3), 503\u2013511 (2013)","journal-title":"IEEE Journal of Biomedical and Health Informatics"}],"container-title":["Lecture Notes in Computational Science and Engineering","Numerical Mathematics and Advanced Applications ENUMATH 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55874-1_112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T00:14:54Z","timestamp":1651796094000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-55874-1_112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,22]]},"ISBN":["9783030558734","9783030558741"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55874-1_112","relation":{},"ISSN":["1439-7358","2197-7100"],"issn-type":[{"type":"print","value":"1439-7358"},{"type":"electronic","value":"2197-7100"}],"subject":[],"published":{"date-parts":[[2020,8,22]]},"assertion":[{"value":"22 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}