{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:00:09Z","timestamp":1742994009034,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723587"},{"type":"electronic","value":"9783319723594"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72359-4_31","type":"book-chapter","created":{"date-parts":[[2017,12,7]],"date-time":"2017-12-07T11:19:11Z","timestamp":1512645551000},"page":"525-538","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration"],"prefix":"10.1007","author":[{"given":"Ye","family":"Li","sequence":"first","affiliation":[]},{"given":"Zoe L.","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"S. M.","family":"Yiu","sequence":"additional","affiliation":[]},{"given":"Junbin","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,8]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: Proceedings of Annual Symposium on Foundations of Computer Science, pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"31_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-540-40061-5_3","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"E Bresson","year":"2003","unstructured":"Bresson, E., Catalano, D., Pointcheval, D.: A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 37\u201354. Springer, Heidelberg (2003). \n                      https:\/\/doi.org\/10.1007\/978-3-540-40061-5_3"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Liu, D., Bertino, E., Yi, X.: Privacy of outsourced k-means clustering. In: Proceedings of ACM Symposium on Information, Computer and Communications Security, pp. 123\u2013134 (2014)","DOI":"10.1145\/2590296.2590332"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: CRYPTO 1984, Proceedings of Advances in Cryptology, pp. 10\u201318 (1985)","DOI":"10.1007\/3-540-39568-7_2"},{"key":"31_CR5","unstructured":"Fan, W., Wang, H., Yu, P.S., et al.: Is random model better? On its accuracy and efficiency. In: IEEE International Conference on Data Mining, pp. 51\u201358. DBLP (2003)"},{"issue":"2","key":"31_CR6","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1016\/j.datak.2007.02.004","volume":"63","author":"F Emekci","year":"2007","unstructured":"Emekci, F., Sahin, O.D., et al.: Privacy preserving decision tree learning over multiple parties. Data Knowl. Eng. 63(2), 348\u2013361 (2007)","journal-title":"Data Knowl. Eng."},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed K-means clustering over arbitrarily partitioned data. In: Proceedings of ACM International Conference on Knowledge Discovery, pp. 593\u2013599 (2005)","DOI":"10.1145\/1081870.1081942"},{"issue":"3","key":"31_CR8","first-page":"199","volume":"1","author":"A Gangrade","year":"2009","unstructured":"Gangrade, A., Patel, R.: Building privacy-preserving C4.5 decision tree classifier on multi-parties. Int. J. Comput. Sci. Eng. 1(3), 199\u2013205 (2009)","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"31_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"S Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264\u2013282. Springer, Heidelberg (2005). \n                      https:\/\/doi.org\/10.1007\/978-3-540-30576-7_15"},{"key":"31_CR10","unstructured":"Zhan, J., Matwin, S., et al.: Privacy preserving decision tree classiffcation over horizontally partitioned data. In: Proceedings of International Conference on Electronic Business, pp. 470\u2013476 (2005)"},{"key":"31_CR11","unstructured":"Zhan, J., Matwin, S., Chang, L.W.: Privacy-preserving decision tree classification over vertically partitioned data. In: Proceedings of IEEE International Conference on Data Mining Workshop on Multiagent Data Warehousing (MADW) and Multiagent Data Mining (MADM), pp. 27\u201335 (2005)"},{"key":"31_CR12","unstructured":"Kamara, S., Mohassel, P., Raykova, M.: Outsourcing multi-party computation. In: IACR Cryptology Eprint Archive, vol. 2011(3), pp. 435\u2013451 (2011)"},{"issue":"3","key":"31_CR13","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Pinkas.: privacy preserving data mining. J. Cryptol. 15(3), 177\u2013206 (2002)","journal-title":"J. Cryptol."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Liu, X., Jiang, Z.L., Yiu, S.M., Wang, X.: Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks. In: Proceedings of International Conference on Mobile Ad-Hoc and Sensor Networks, pp. 124\u2013133 (2015)","DOI":"10.1109\/MSN.2015.42"},{"issue":"11","key":"31_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2016.2625398","volume":"11","author":"X Liu","year":"2016","unstructured":"Liu, X., Deng, R., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkits with multiple keys. IEEE Trans. Inf. Forensics Secur. 11(11), 1\u20131 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR16","unstructured":"Xiao, M., Huang, L., et al.: Privacy preserving ID3 algorithm over horizontally partitioned data. In: Proceedings of International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239\u2013243 (2005)"},{"key":"31_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). \n                      https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"31_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/978-3-642-33627-0_25","volume-title":"Privacy in Statistical Databases","author":"P Lory","year":"2012","unstructured":"Lory, P.: Enhancing the efficiency in privacy preserving learning of decision trees in partitioned databases. In: Domingo-Ferrer, J., Tinnirello, I. (eds.) PSD 2012. LNCS, vol. 7556, pp. 322\u2013335. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-33627-0_25"},{"issue":"12","key":"31_CR19","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/TIFS.2013.2288131","volume":"8","author":"A Peter","year":"2013","unstructured":"Peter, A., Tews, E., Katzenbeisser, S.: Efficiently outsourcing multiparty computation under multiple keys. IEEE Trans. Inf. Forensics Secur. 8(12), 2046\u20132058 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"31_CR20","doi-asserted-by":"crossref","unstructured":"Samet, S., Miri, A.: Privacy preserving ID3 using Gini index over horizontally partitioned data. In: Proceedings of IEEE\/ACS International Conference on Computer Systems and Applications, pp. 645\u2013651 (2008)","DOI":"10.1109\/AICCSA.2008.4493598"},{"key":"31_CR21","doi-asserted-by":"crossref","unstructured":"Shen, Y., Shao, H., Yang, L.: Privacy preserving C4.5 algorithm over vertically distributed datasets. In: Proceedings of IEEE International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 446\u2013448 (2009)","DOI":"10.1109\/NSWCTC.2009.253"},{"key":"31_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/11535706_11","volume-title":"Data and Applications Security XIX","author":"J Vaidya","year":"2005","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: Jajodia, S., Wijesekera, D. (eds.) DBSec 2005. LNCS, vol. 3654, pp. 139\u2013152. Springer, Heidelberg (2005). \n                      https:\/\/doi.org\/10.1007\/11535706_11"},{"issue":"5","key":"31_CR23","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1109\/TDSC.2013.43","volume":"11","author":"J Vaidya","year":"2014","unstructured":"Vaidya, J., Shafiq, B., Fan, W., et al.: A random decision tree framework for privacy-preserving data mining. IEEE Trans. Dependable Secure Comput. 11(5), 399\u2013411 (2014)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"31_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, M.J., Han, K., Huang, L.S., et al.: Privacy preserving C4.5 algorithm over horizontally partitioned data. In: Proceedings of International Conference on Grid and Cooperative Computing, pp. 78\u201385 (2006)","DOI":"10.1109\/GCC.2006.73"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72359-4_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T03:04:34Z","timestamp":1558321474000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72359-4_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723587","9783319723594"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72359-4_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"8 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ispec2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}