{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:40:09Z","timestamp":1749688809362,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319491509"},{"type":"electronic","value":"9783319491516"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49151-6_21","type":"book-chapter","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T02:09:46Z","timestamp":1478225386000},"page":"300-314","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree"],"prefix":"10.1007","author":[{"given":"Yaoan","family":"Jin","sequence":"first","affiliation":[]},{"given":"Chunhua","family":"Su","sequence":"additional","affiliation":[]},{"given":"Na","family":"Ruan","sequence":"additional","affiliation":[]},{"given":"Weijia","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,5]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Cheung, D.W., Han, J., Ng, V.T., et al.: A fast distributed algorithm for mining association rules. In: IEEE International Conference on Parallel, Distributed Information Systems, pp. 31\u201342 (2011)","DOI":"10.1109\/PDIS.1996.568665"},{"issue":"1","key":"21_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., et al.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Discov. 8(1), 53\u201387 (2004)","journal-title":"Data Min. Knowl. Discov."},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"9","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans. Knowl. Data Eng. 9, 1026\u20131037 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"21_CR4","doi-asserted-by":"publisher","first-page":"970","DOI":"10.1109\/TKDE.2013.41","volume":"26","author":"T Tassa","year":"2014","unstructured":"Tassa, T.: Secure mining of association rules in horizontally distributed databases. IEEE Trans. Knowl. Data Eng. 26(4), 970\u2013983 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"21_CR5","first-page":"71","volume":"32","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Kanellopoulos, D.: Association rules mining: a recent overview. GESTS Int. Trans. Comput. Sci. Eng. 32(1), 71\u201382 (2006)","journal-title":"GESTS Int. Trans. Comput. Sci. Eng."},{"key":"21_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-28651-6_47","volume-title":"Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2004","author":"T Fukasawa","year":"2004","unstructured":"Fukasawa, T., Wang, J., Takata, T., Miyazaki, M.: An effective distributed privacy-preserving data mining algorithm. In: Yang, Z.R., Yin, H., Everson, R.M. (eds.) IDEAL 2004. LNCS, vol. 3177, pp. 320\u2013325. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-28651-6_47"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Luo, D., Xiao, C., Sun, S., et al.: Searching association rules of traditional Chinese medicine on Ligusticum wallichii by text mining. In: IEEE International Conference on Bioinformatics, Biomedicine (BIBM), pp. 162\u2013167. IEEE (2013)","DOI":"10.1109\/BIBM.2013.6732664"},{"issue":"3","key":"21_CR8","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1007\/s10115-013-0721-z","volume":"42","author":"G Czibula","year":"2015","unstructured":"Czibula, G., Marian, Z., Czibula, I.G.: Detecting software design defects using relational association rule mining. Knowl. Inf. Syst. 42(3), 545\u2013577 (2015)","journal-title":"Knowl. Inf. Syst."},{"key":"21_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/978-3-540-87734-9_5","volume-title":"Advances in Neural Networks - ISNN 2008","author":"J Hu","year":"2008","unstructured":"Hu, J., Yang-Li, X.: A fast parallel association rules mining algorithm based on FP-forest. In: Sun, F., Zhang, J., Tan, Y., Cao, J., Yu, W. (eds.) ISNN 2008. LNCS, vol. 5264, pp. 40\u201349. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-87734-9_5"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Li, H., Wang, Y., Zhang, D., et al.: PFP: parallel FP-growth for query recommendation. In: Proceedings of the 2008 ACM Conference on Recommender Systems, pp. 107\u2013114. ACM (2008)","DOI":"10.1145\/1454008.1454027"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"Z Brakerski","year":"2011","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 505\u2013524. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-22792-9_29"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1142\/S0219493709002610","volume":"9","author":"C Gentry","year":"2009","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. STOC 9, 169\u2013178 (2009)","journal-title":"STOC"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013124. ACM (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Aono, Y., Hayashi, T., Trieu Phong, L., et al.: Scalable and secure logistic regression via homomorphic encryption. In: Data and Application Security and Privacy, pp. 142\u2013144. ACM (2016)","DOI":"10.1145\/2857705.2857731"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Park, J.S., Chen, M.S., Yu, P.S.: An effective hash-based algorithm for mining association rules. ACM (1995)","DOI":"10.1145\/223784.223813"},{"key":"21_CR17","first-page":"487","volume":"1215","author":"R Agrawal","year":"1994","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules. VLDB 1215, 487\u2013499 (1994)","journal-title":"VLDB"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Gomez-Barrero, M., Fierrez, J., Galbally, J.: Variable-length template protection based on homomorphic encryption with application to signature biometrics. In: International Conference on Biometrics and Forensics (IWBF). IEEE (2016)","DOI":"10.1109\/CVPRW.2016.39"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49151-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T00:00:42Z","timestamp":1749686442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49151-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319491509","9783319491516"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49151-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zhangjiajie","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}