{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T10:22:25Z","timestamp":1763202145863,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914541"},{"type":"electronic","value":"9783319914558"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91455-8_8","type":"book-chapter","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T05:35:37Z","timestamp":1526016937000},"page":"89-98","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Secure Computation of Pearson Correlation Coefficients for High-Quality Data Analytics"],"prefix":"10.1007","author":[{"given":"Sun-Kyong","family":"Hong","sequence":"first","affiliation":[]},{"given":"Myeong-Seon","family":"Gil","sequence":"additional","affiliation":[]},{"given":"Yang-Sae","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,12]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","unstructured":"Aggarwal, C.C., Yu, P.S.: Privacy-preserving data mining: a survey. In: Gertz, M., Jajodia, S. (eds.) Handbook of Database Security, pp. 431\u2013460. Springer, Boston (2008). https:\/\/doi.org\/10.1007\/978-0-387-48533-1_18","DOI":"10.1007\/978-0-387-48533-1_18"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of International Conference on Management of Data, ACM SIGMOD, Dallas, TX, pp. 439\u2013450, June 2000","DOI":"10.1145\/342009.335438"},{"key":"8_CR3","doi-asserted-by":"publisher","DOI":"10.4135\/9781849208604","volume-title":"Analyzing Quantitative Data","author":"N Blaikie","year":"2003","unstructured":"Blaikie, N.: Analyzing Quantitative Data. Sage Publications, London (2003)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications - a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms, New York, NY, pp. 13\u201322, September 2001","DOI":"10.1145\/508171.508174"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Goethals, B., Laur, S., Lipmaa, H., Mielik\u00e4inen, T.: On private scalar product computation for privacy-preserving data mining. In: Proceedings of the 7th International Conference on Information Security and Cryptology, Seoul, Korea, pp. 104\u2013120, December 2004","DOI":"10.1007\/11496618_9"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Jiang, W., Murugesan, M., Clifton, C., Si, L.: Similar document detection with limited information disclosure. In: Proceedings of the 24th International Conference on Data Engineering, Cancun, pp. 735\u2013743, April 2008","DOI":"10.1109\/ICDE.2008.4497482"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.datak.2012.03.003","volume":"76\u201378","author":"MG Kaosar","year":"2012","unstructured":"Kaosar, M.G., Paulet, R., Yi, X.: Fully homomorphic encryption based two-party association rule mining. Data Knowl. Eng. 76\u201378, 1\u201315 (2012)","journal-title":"Data Knowl. Eng."},{"key":"8_CR8","unstructured":"Kim, S.-P., Gil, M.-S., Kim, H., Choi, M.-J., Moon, Y.-S., Won, H.-S.: Efficient two-step protocol and its discriminative feature selections in secure similar document detection. Secur. Commun. Netw. 2017, Article ID 6841216, 1\u201312 (2017)"},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"2085","DOI":"10.1109\/ACCESS.2017.2781464","volume":"6","author":"M Lee","year":"2018","unstructured":"Lee, M., Lee, S., Choi, M.-J., Moon, Y.-S., Lim, H.-S.: HybridFTW: hybrid computation of dynamic time warping distances. IEEE Access 6, 2085\u20132096 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"8_CR10","first-page":"419","volume":"12","author":"S Lee","year":"2016","unstructured":"Lee, S., Kim, B.-S., Choi, M.-J., Moon, Y.-S.: Coefficient control multi-step $$k$$-NN search in time-series databases. Int. J. Innov. Comput. Inf. Control 12(2), 419\u2013431 (2016)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Moon, Y.-S., Kim, H.-S., Kim, S.-P., Bertino, E.: Publishing time-series data under preservation of privacy and distance orders. In: Proceedings of the 21st International Conference on Database and Expert Systems Application, Bilbao, Spain, pp. 17\u201331, August 2010","DOI":"10.1007\/978-3-642-15251-1_2"},{"key":"8_CR12","unstructured":"National Climate Data Center. http:\/\/www.ncdc.noaa.gov"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Sayal, M., Singh, L.: Privately detecting pairwise correlations in distributed time series. In: Proceedings of IEEE International Conference on Privacy, Security, Risk, and Trust and IEEE International Conference on Social Computing, Boston, MA, pp. 981\u2013987, October 2011","DOI":"10.1109\/PASSAT\/SocialCom.2011.99"},{"issue":"14","key":"8_CR14","doi-asserted-by":"publisher","first-page":"2348","DOI":"10.1002\/sec.1501","volume":"9","author":"H-S Won","year":"2016","unstructured":"Won, H.-S., Kim, S.-P., Lee, S., Choi, M.-J., Moon, Y.-S.: Secure principal component analysis in multiple distributed nodes. Secur. Commun. Netw. 9(14), 2348\u20132358 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23th IEEE Symposium on Foundations of Computer Science, Chicago, IL, pp. 160\u2013164, November 1982","DOI":"10.1109\/SFCS.1982.38"},{"issue":"5","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/TKDE.2012.90","volume":"25","author":"X Yi","year":"2013","unstructured":"Yi, X., Kaosar, M.G., Paulet, R., Bertino, E.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125\u20131134 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91455-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T18:44:18Z","timestamp":1571337858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-91455-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914541","9783319914558"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91455-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}