{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:37:00Z","timestamp":1725489420127},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540738701"},{"type":"electronic","value":"9783540738718"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-73871-8_15","type":"book-chapter","created":{"date-parts":[[2007,8,13]],"date-time":"2007-08-13T14:14:18Z","timestamp":1187014458000},"page":"146-157","source":"Crossref","is-referenced-by-count":6,"title":["Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases"],"prefix":"10.1007","author":[{"given":"P.","family":"Krishna Prasad","sequence":"first","affiliation":[]},{"given":"C.","family":"Pandu Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the 2000 ACM SIGMOD, Dallas, TX (May 14-19, 2000)","DOI":"10.1145\/342009.335438"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/11496618_2","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"B. Goethals","year":"2005","unstructured":"Goethals, B., Laur, S., Lipmaa, H., Mielikainen,: On private scalar product computation for privacy-preserving data mining. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 2\u20133. Springer, Heidelberg (2005)"},{"key":"15_CR3","unstructured":"Brankovic, L., Estivill-Castro, V.: Privacy issues in knowledge discovery and data mining. In: AICE 1999. Proceedings of Australian Institute of Computer Ethics Conference, Melbourne, Victoria, Australia (1999)"},{"key":"15_CR4","first-page":"120","volume-title":"SIGSAC","author":"C. Cachin","year":"1999","unstructured":"Cachin, C.: Efficient private bidding and auctions with an oblivious third party. In: SIGSAC. Proceedings of 6th ACM Computer and communications security, pp. 120\u2013127. ACM Press, New York (1999)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I. Damgard","year":"2001","unstructured":"Damgard, I., Jurik, M.: A Generalisation, a Simplification and Some Applications of Paillier\u2019s Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol.\u00a01992, pp. 13\u201315. Springer, Heidelberg (2001)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"1461","DOI":"10.2307\/1229519","volume":"52","author":"M. Froomkin","year":"2000","unstructured":"Froomkin, M.: Death of Privacy? Stanford Law Review\u00a052, 1461\u20131543 (2000)","journal-title":"Stanford Law Review"},{"key":"15_CR7","first-page":"21","volume-title":"Proceedings of the 11th ACM SIGKDD","author":"G. Jagannathan","year":"2005","unstructured":"Jagannathan, G., Wright, R.N.: Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the 11th ACM SIGKDD, Chicago, Illinois, USA, August 21-24 2005, pp. 21\u201324. ACM, New York (2005)"},{"key":"15_CR8","series-title":"Ch. 3","volume-title":"Algorithms for Clustering Data","author":"A.K. Jain","year":"1988","unstructured":"Jain, A.K., Dubes, R.C.: Algorithms for Clustering Data. Ch. 3. Prentice-Hall Inc, Englewood Cliffs (1988)"},{"key":"15_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/11555827_23","volume-title":"Computer Security \u2013 ESORICS 2005","author":"S. Jha","year":"2005","unstructured":"Jha, S., Kruger, L., McDaniel, P.: Privacy Preserving Clustering. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 397\u2013417. Springer, Heidelberg (2005)"},{"key":"15_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"15_CR11","unstructured":"Naor, M., Pinkas, B.: Oblivious transfer and polynomial evaluation(extended abstract). In: Proceedings of the 31st ACM Symposium on Theory of Computing, Atanta, GA, USA, pp. 245\u2013254 (May 1-4, 1999)"},{"key":"15_CR12","series-title":"Ch. 11","volume-title":"Implementing Database Security and Auditing","author":"R.B. Natan","year":"2005","unstructured":"Natan, R.B.: Implementing Database Security and Auditing. Ch. 11. Elsevier, North-Holland (2005)"},{"key":"15_CR13","unstructured":"Oliveira, S., Zaiane, O.R.: Privacy preserving clustering by data transformation. In: Proceedings of the 18th Brazilian Symposium on Databases, pp. 304\u2013318 (2003)"},{"key":"15_CR14","series-title":"Lecture Notes in Computer Science","first-page":"2","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 2\u20136. Springer, Heidelberg (1999)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving k-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD, Washington, DC, USA (August 24-27, 2003)","DOI":"10.1145\/956750.956776"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/11844662_7","volume-title":"Secure Data Management","author":"P. Krishna Prasad","year":"2006","unstructured":"Krishna Prasad, P., Pandu Rangan, C.: Privacy preserving BIRCH algorithm for clustering over vertically partitioned databases. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2006. LNCS, vol.\u00a04165, pp. 84\u201399. Springer, Heidelberg (2006)"},{"key":"15_CR17","unstructured":"Quittner, J.: The Death of Privac. Time Magazine (August 1997)"},{"key":"15_CR18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138","volume-title":"Philosophical Dimensions of Privacy: An Anthology","author":"F. Schoeman","year":"1984","unstructured":"Schoeman, F.: Philosophical Dimensions of Privacy: An Anthology. Cambridge University Press, Cambridge (1984)"},{"issue":"2","key":"15_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/503345.503347","volume":"31","author":"G.J. Walters","year":"2001","unstructured":"Walters, G.J.: Privacy and security: an ethical analysis. ACM SIGCAS Computers and Society\u00a031(2), 8\u201323 (2001)","journal-title":"ACM SIGCAS Computers and Society"},{"key":"15_CR20","first-page":"160","volume-title":"Proceedings of 23rd IEEE Symposium on Foundations of Computer Science","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocols for secure computation. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164. IEEE Computer Society Press, Los Alamitos (1982)"},{"key":"15_CR21","first-page":"27","volume-title":"Proceedings of the 27th IEEE Symp. on Foundations of Computer Science","author":"A.C. Yao","year":"1986","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symp. on Foundations of Computer Science, Toronto, Ontario, Canada, October 27 - 29, 1986, pp. 27\u201329. IEEE Computer Society Press, Los Alamitos (1986)"},{"key":"15_CR22","first-page":"103","volume-title":"Proceedings of the ACM SIGMOD","author":"T. Zhang","year":"1996","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: BIRCH: An efficient Data Clustering Method of Very Large Databases. In: Proceedings of the ACM SIGMOD, Montreal, Canada, June 1996, pp. 103\u2013114. ACM Press, New York (1996)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73871-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T16:04:15Z","timestamp":1550765055000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73871-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540738701","9783540738718"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73871-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}