{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:09:42Z","timestamp":1742965782284,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642252549"},{"type":"electronic","value":"9783642252556"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-25255-6_81","type":"book-chapter","created":{"date-parts":[[2011,12,7]],"date-time":"2011-12-07T07:24:03Z","timestamp":1323242643000},"page":"641-648","source":"Crossref","is-referenced-by-count":1,"title":["Protocol to Compute Polygon Intersection in STC Model"],"prefix":"10.1007","author":[{"given":"Yifei","family":"Yao","sequence":"first","affiliation":[]},{"given":"Miaomiao","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Shurong","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"81_CR1","unstructured":"Du, W., Mikhail, J.A.: Privacy-preserving Cooperative Scientific Computation. In: 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, pp. 273\u2013282 (2001)"},{"issue":"3","key":"81_CR2","first-page":"481","volume":"17","author":"Y. Yao","year":"2008","unstructured":"Yao, Y., Huang, L., Luo, Y.: Privacy-preserving Matrix Rank Computation and Its Applications. Chinese Journal of Electronics\u00a017(3), 481\u2013486 (2008)","journal-title":"Chinese Journal of Electronics"},{"issue":"2","key":"81_CR3","first-page":"259","volume":"20","author":"S. Li","year":"2005","unstructured":"Li, S., Dai, Y.: Secure Two-Party Computational Geometry. Journal of Computer Science and Technology\u00a020(2), 259\u2013263 (2005)","journal-title":"Journal of Computer Science and Technology"},{"key":"81_CR4","first-page":"160","volume-title":"21st Annual IEEE Symposium on the Foundations of Computer Science","author":"A.C. Yao","year":"1982","unstructured":"Yao, A.C.: Protocol for Secure Computations (extended abstract). In: 21st Annual IEEE Symposium on the Foundations of Computer Science, pp. 160\u2013164. IEEE Press, New York (1982)"},{"key":"81_CR5","doi-asserted-by":"crossref","unstructured":"Yehuda, L., Benny, P.: An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries. In: 26th Annual International Conference on Advances in Cryptology, Barcelona, Spain, pp. 52\u201378 (2007)","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"81_CR6","volume-title":"Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, PAIS 2011, article 6","author":"B. Hawashin","year":"2011","unstructured":"Hawashin, B., Fotouhi, F., Truta, T.M.: A Privacy Preserving Efficient Protocol for Semantic Similarity Join Using Long String Attributes. In: Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society, PAIS 2011, article 6. ACM, New York (2011)"},{"key":"81_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/978-3-642-17955-6_25","volume-title":"Information Security Applications","author":"R. Dowsley","year":"2011","unstructured":"Dowsley, R., van de Graaf, J., Marques, D., Nascimento, C.A.: A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 337\u2013350. Springer, Heidelberg (2011)"},{"key":"81_CR8","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1145\/1806689.1806786","volume-title":"Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010","author":"M. Hardt","year":"2010","unstructured":"Hardt, M., Talwar, K.: On the Geometry of Differential Privacy. In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, pp. 705\u2013714. ACM, New York (2010)"},{"key":"81_CR9","first-page":"13","volume-title":"Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2010","author":"D. Eppstein","year":"2010","unstructured":"Eppstein, D., Goodrich, M.T., Tamassia, R.: Privacy-preserving Data-oblivious Geometric Algorithms for Geographic Data. In: Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS 2010, pp. 13\u201322. ACM, New York (2010)"},{"key":"81_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-01957-9_8","volume-title":"Applied Cryptography and Network Security","author":"D. Dachman-Soled","year":"2009","unstructured":"Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient Robust Private Set Intersection. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol.\u00a05536, pp. 125\u2013142. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Information Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-25255-6_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T09:22:44Z","timestamp":1561022564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-25255-6_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642252549","9783642252556"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-25255-6_81","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}