{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:37:14Z","timestamp":1725889034368},"publisher-location":"Cham","reference-count":5,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319600796"},{"type":"electronic","value":"9783319600802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-60080-2_14","type":"book-chapter","created":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:40:06Z","timestamp":1496328006000},"page":"193-195","source":"Crossref","is-referenced-by-count":1,"title":["Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party"],"prefix":"10.1007","author":[{"given":"Nir","family":"Maoz","sequence":"first","affiliation":[]},{"given":"Ehud","family":"Gudes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,2]]},"reference":[{"key":"14_CR1","unstructured":"Chow, S.S.M., Lee, J.-H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: NDSS 2009"},{"issue":"12","key":"14_CR2","doi-asserted-by":"crossref","first-page":"5813","DOI":"10.1016\/j.csda.2006.10.013","volume":"51","author":"J Ghosh","year":"2007","unstructured":"Ghosh, J., Reiter, J.P., Karr, A.F.: Secure computation with horizontally partitioned data using adaptive regression splines. Comput. Stat. Data Anal. 51(12), 5813\u20135820 (2007)","journal-title":"Comput. Stat. Data Anal."},{"issue":"4","key":"14_CR3","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TKDE.2013.41","volume":"26","author":"T Tassa","year":"2014","unstructured":"Tassa, T.: Secure mining of association rules in horizontally distributed databases. IEEE Trans. Knowl. Data Eng. 26(4), 970\u2013983 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"14_CR4","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/2188349.2188353","volume":"37","author":"T Tassa","year":"2012","unstructured":"Tassa, T., Gudes, E.: Secure distributed computation of anonymized views of shared databases. ACM Trans. Database Syst. (TODS) 37(2), 11 (2012)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"issue":"2","key":"14_CR5","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1016\/j.ins.2006.08.010","volume":"177","author":"S Zhong","year":"2007","unstructured":"Zhong, S.: Privacy-preserving algorithms for distributed mining of frequent itemsets. Inf. Sci. 177(2), 490\u2013503 (2007)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","Cyber Security Cryptography and Machine Learning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60080-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T14:43:46Z","timestamp":1496328226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60080-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319600796","9783319600802"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60080-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}