{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:39:52Z","timestamp":1725496792836},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540770275"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77028-2_29","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T06:57:12Z","timestamp":1196405832000},"page":"494-513","source":"Crossref","is-referenced-by-count":4,"title":["Using Cryptography for Privacy Protection in Data Mining Systems"],"prefix":"10.1007","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/375551.375602","volume-title":"Proceedings of the Twenti- eth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems","author":"D. Agrawal","year":"2001","unstructured":"Agrawal, D., Aggarwal, C.: On the design and quantification of privacy preserving data mining algorithms. In: Proceedings of the Twenti- eth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA, May 21-23, pp. 247\u2013255. ACM Press, New York (2001)"},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1145\/342009.335438","volume-title":"Proceedings of the ACM SIGMOD Conference on Management of Data","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450. ACM Press, New York (2000)"},{"key":"29_CR3","unstructured":"Berkhin, P.: Survey of clustering data mining techniques. Technical report, Accrue Software, San Jose, CA (2002)"},{"issue":"10","key":"29_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification. Communication of the ACM\u00a028(10), 1030\u20131044 (1985)","journal-title":"Communication of the ACM"},{"key":"29_CR5","volume-title":"IEEE Intertional Workshop on Privacy, Security, and Data Mining","author":"W. Du","year":"2002","unstructured":"Du, W., Zhan, Z.: Building decision tree classifier on private data. In: IEEE Intertional Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, December 9, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"29_CR6","volume-title":"Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"W. Du","year":"2003","unstructured":"Du, W., Zhan, Z.: Using randomized response techniques for privacy-preserving data mining. In: Proceedings of The 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24 - 27, ACM Press, New York (2003)"},{"key":"29_CR7","unstructured":"Epic. Privacy and human rights an international survey of privacy laws and developments. In: Electronic Privacy Information Center (May 2003), http:\/\/www.epic.org"},{"key":"29_CR8","volume-title":"Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003)","author":"A. Evfimievski","year":"2003","unstructured":"Evfimievski, A., Gehrke, J.E., Srikant, R.: Limiting privacy breaches in privacy preserving data mining. In: Proceedings of the 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS 2003), San Diego, CA, ACM Press, New York (2003)"},{"key":"29_CR9","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1145\/775047.775080","volume-title":"Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"A. Evfmievski","year":"2002","unstructured":"Evfmievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy preserving mining of association rules. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, pp. 217\u2013228. ACM Press, New York (2002)"},{"key":"29_CR10","unstructured":"Goldreich, O.: Secure multi-party computation (working draft) (1998), http:\/\/www.wisdom.weizmann.ac.il\/home\/oded\/public_html\/foc.html"},{"key":"29_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"The foundations of cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: The foundations of cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"29_CR12","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2000","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2000)"},{"key":"29_CR13","first-page":"24","volume-title":"DMK 2002. The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery","author":"M. Kantarcioglu","year":"2002","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-preserving distributed mining of association rules on horizontally partitioned data. In: DMK 2002. The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery, Madison, WI, pp. 24\u201331. ACM Press, New York (2002)"},{"key":"29_CR14","volume-title":"ICDM 2003. Proceedings of the Third IEEE International Conference on Data Mining","author":"H. Kargupta","year":"2003","unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the privacy preserving properties of random data perturbation techniques. In: ICDM 2003. Proceedings of the Third IEEE International Conference on Data Mining, Melbourne, FL, November 19-22, IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"29_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","volume-title":"Finding groups in data","author":"L. Kaufman","year":"1990","unstructured":"Kaufman, L., Rousseeuw, P.: Finding groups in data. Wiley, New York (1990)"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Lin, X., Clifton, C., Zhu, M.: Privacy preserving clustering with distributed em mixture modeling. In: Knowledge and Information Systems (2004)","DOI":"10.1007\/s10115-004-0148-7"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, Springer, Heidelberg (2000)"},{"key":"29_CR18","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"29_CR19","first-page":"169","volume-title":"Foundations of Secure Computation","author":"R. Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169\u2013179. Academic Press, London (1978)"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Rizvi, S., Haritsa, J.: Maintaining data privacy in association rule mining. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)","DOI":"10.1016\/B978-155860869-6\/50066-4"},{"key":"29_CR21","volume-title":"Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2002","unstructured":"Vaidya, J., Clifton, C.: Privacy preserving association rule mining in vertically partitioned data. In: Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 23-26, ACM Press, New York (2002)"},{"key":"29_CR22","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-preserving decision trees over vertically partitioned data. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)","DOI":"10.1007\/11535706_11"},{"key":"29_CR23","volume-title":"Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"J. Vaidya","year":"2003","unstructured":"Vaidya, J., Clifton, C.W.: Privacy preserving k-means clustering over vertically partitioned data. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24-27, ACM Press, New York (2003)"},{"key":"29_CR24","unstructured":"Weight, J.: Ensuring trust in the electronic health record. In: Electronic Health Information and Privacy Conference, Ottawa, Canada (2005)"},{"key":"29_CR25","volume-title":"Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)","author":"R. Wright","year":"2004","unstructured":"Wright, R., Yang, Z.: Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), ACM Press, New York (2004)"},{"key":"29_CR26","volume-title":"Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos (1982)"},{"key":"29_CR27","doi-asserted-by":"crossref","unstructured":"Zhan, J.: Privacy Preserving Collaborative Data Mining. PhD thesis, Department of Computer Science, University of Ottawa (2006)","DOI":"10.1109\/ISI.2007.379472"},{"key":"29_CR28","volume-title":"Workshop on Privacy Aspect of Data Mining (PADM 2006) in conjunction with the IEEE International Conference on Data Mining (ICDM 2006)","author":"J. Zhan","year":"2006","unstructured":"Zhan, J., Matwin, S.: A crypto-based approach to privacy preserving collaborative data mining. In: Workshop on Privacy Aspect of Data Mining (PADM 2006) in conjunction with the IEEE International Conference on Data Mining (ICDM 2006), HongKong, December 1, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"29_CR29","doi-asserted-by":"crossref","unstructured":"Zhan, J., Matwin, S., Chang, L.: Privacy-preserving collaborative association rule mining. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Nathan Hale Inn, University of Connecticut, Storrs, CT, U.S.A (August 7-10, 2005)","DOI":"10.1007\/11535706_12"}],"container-title":["Lecture Notes in Computer Science","Web Intelligence Meets Brain Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77028-2_29.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:54:56Z","timestamp":1619520896000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77028-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540770275"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77028-2_29","relation":{},"subject":[]}}