{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:15:16Z","timestamp":1759637716273,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540885818"},{"type":"electronic","value":"9783540885825"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88582-5_49","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:28:50Z","timestamp":1224034130000},"page":"526-537","source":"Crossref","is-referenced-by-count":14,"title":["Secure Multi-party Protocols for Privacy Preserving Data Mining"],"prefix":"10.1007","author":[{"given":"Qingkai","family":"Ma","sequence":"first","affiliation":[]},{"given":"Ping","family":"Deng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-Preserving Data Mining. In: The 2000 ACM SIGMOD Conference on Management of Data, Dallas, TX, pp. 439\u2013450 (2000)","DOI":"10.1145\/342009.335438"},{"key":"49_CR2","series-title":"Springer LNCS Tutorial. LNCS","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/3-540-48969-X_2","volume-title":"Lectures on Data Security - Modern Cryptology in Theory and Practice","author":"R. Cramer","year":"1999","unstructured":"Cramer, R.: Introduction to Secure Computation. In: Damgaard, I. (ed.) EEF School 1998. Springer LNCS Tutorial. LNCS, vol.\u00a01561, pp. 16\u201362. Springer, Heidelberg (1999) (revised January 2000)"},{"key":"49_CR3","unstructured":"Du, W., Zhan, Z.: Building Decision Tree Classifier on Private Data. In: The 2002 IEEE International Conference on Privacy, Security and Data Mining, Australia, pp. 1\u20138 (2002)"},{"key":"49_CR4","series-title":"Foundations of Cryptography","volume-title":"Secure multi-party computation","author":"O. Goldreich","year":"2004","unstructured":"Goldreich, O.: Secure multi-party computation. Foundations of Cryptography, vol.\u00a02. Cambridge University Press, Cambridge (2004)"},{"key":"49_CR5","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2006","unstructured":"Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Morgan Kaufmann Publishers, San Francisco (2006)","edition":"2"},{"key":"49_CR6","unstructured":"Ma, Q., Hao, W., Yen, I., Bastani, F.: Multiparty Computation with Full Computation Power and Reduced Overhead. In: The 8th IEEE HASE, Tampa (2004)"},{"key":"49_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/3-540-44598-6_3","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Lindell","year":"2000","unstructured":"Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 36\u201354. Springer, Heidelberg (2000)"},{"key":"49_CR8","doi-asserted-by":"crossref","unstructured":"Vaidya, J., Clifton, C.: Privacy-Preserving Decision Trees over Vertically Partitioned Data. In: Data and Application Security, pp. 139\u2013152 (2005)","DOI":"10.1007\/11535706_11"},{"key":"49_CR9","doi-asserted-by":"crossref","unstructured":"Verykios, V.S., Bertino, E., Fovino, I.N., Provenza, L.P., Saygin, Y., Theodoridis, Y.: State-of-the-art in privacy preserving data mining. ACM SIGMOD Record, 33(1), 50\u201357 (2004)","DOI":"10.1145\/974121.974131"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, M., Huang, L., Luo, Y., Shen, H.: Privacy Preserving ID3 Algorithm over Horizontally Partitioned Data. In: The 6th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 239\u2013243 (2005)","DOI":"10.1109\/PDCAT.2005.191"},{"key":"49_CR11","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proc. 23rd FOCS, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"49_CR12","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proc. 27th FOCS, pp. 162\u2013166 (1986)","DOI":"10.1109\/SFCS.1986.25"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88582-5_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T19:16:33Z","timestamp":1738437393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88582-5_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540885818","9783540885825"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88582-5_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}