{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:47:03Z","timestamp":1725518823891},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88192-6_17","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T04:05:59Z","timestamp":1222661159000},"page":"170-181","source":"Crossref","is-referenced-by-count":10,"title":["A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree"],"prefix":"10.1007","author":[{"given":"Chunhua","family":"Su","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.N.: Mining association rules between sets of items in large databases. In: Proceedings of the ACM SIGMOD International Conference on Management of Data (1993)","DOI":"10.1145\/170035.170072"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: ACM SIGMOD Int\u2019l Conf. on Management of Data, Dallas (May 2000)","DOI":"10.1145\/342009.335438"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., Gehrke, J.: Privacy Preserving Mining of Association Rules. In: Proc. of 8th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining (KDD) (2002)","DOI":"10.1145\/775047.775080"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proc. of FOCS, pp. 427\u2013437 (1987)","DOI":"10.1109\/SFCS.1987.4"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Fukazawa, T., Wang, J., Takata, T., Miyazak, M.: An Effective Distributed Privacy-Preserving Data Mining Algorithm. In: Fifth International Conference on Intelligent Data Engineering and Automated Learning, UK (2004)","DOI":"10.1007\/978-3-540-28651-6_47"},{"key":"17_CR6","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography, vol.\u00a02, ch.7. Cambridge Univ. Press, Cambridge (2004)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the 19th annual ACM symposium on Theory of computing (1987)","DOI":"10.1145\/28395.28420"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach. Data Mining and Knowledge Discovery, 53\u201387 (2004)","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"17_CR9","unstructured":"Kantarcioglu, M., Clifton, C.: Privacy-Preserving Distributed Mining of association rules on horizontally partitioned data. In: Proceedings of the ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery (2002)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592. Springer, Heidelberg (1999)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A. Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Vaidya, J.S., Clifton, C.: Privacy Preserving Association Rule Mining in Vertically Partitioned Data. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002)","DOI":"10.1145\/775047.775142"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for Secure Computation. In: 23rd FOCS (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Zhan, J.Z., Matwin, S., Chang, L.: Privacy-Preserving Collaborative Association Rule Mining. In: Procceding of DBSec 2005, pp. 153\u2013165 (2005)","DOI":"10.1007\/11535706_12"},{"key":"17_CR16","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"M. Freedman","year":"2004","unstructured":"Freedman, M., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 1\u201319. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:57:39Z","timestamp":1619510259000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881919","9783540881926"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}