{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:40:17Z","timestamp":1743028817678,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642302435"},{"type":"electronic","value":"9783642302442"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30244-2_6","type":"book-chapter","created":{"date-parts":[[2012,4,28]],"date-time":"2012-04-28T12:55:50Z","timestamp":1335617750000},"page":"64-75","source":"Crossref","is-referenced-by-count":10,"title":["Agent Based Middleware for Maintaining User Privacy in IPTV Recommender Services"],"prefix":"10.1007","author":[{"given":"Ahmed M.","family":"Elmisery","sequence":"first","affiliation":[]},{"given":"Dmitri","family":"Botvich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Hand, S., Varan, D.: Interactive Narratives: Exploring the Links between Empathy, Interactivity and Structure, pp. 11\u201319 (2008)","key":"6_CR1","DOI":"10.1007\/978-3-540-69478-6_2"},{"key":"6_CR2","volume-title":"Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society","author":"L.F. Cranor","year":"2003","unstructured":"Cranor, L.F.: \u2019I didn\u2019t buy it for myself\u2019 privacy and ecommerce personalization. In: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. ACM, Washington, DC (2003)"},{"unstructured":"Dialogue, C.: Cyber Dialogue Survey Data Reveals Lost Revenue for Retailers Due to Widespread Consumer Privacy Concerns. Cyber Dialogue (2001)","key":"6_CR3"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust De-anonymization of Large Sparse Datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. IEEE Computer Society (2008)","key":"6_CR4","DOI":"10.1109\/SP.2008.33"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1145\/1557019.1557090","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"F. McSherry","year":"2009","unstructured":"McSherry, F., Mironov, I.: Differentially private recommender systems: building privacy into the net. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 627\u2013636. ACM, Paris (2009)"},{"doi-asserted-by":"crossref","unstructured":"Esma, A.: Experimental Demonstration of a Hybrid Privacy-Preserving Recommender System. In: Gilles, B., Jose, M.F., Flavien Serge Mani, O., Zbigniew, R. (eds.), 161\u2013170 (2008)","key":"6_CR6","DOI":"10.1109\/ARES.2008.193"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1145\/564376.564419","volume-title":"Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"J. Canny","year":"2002","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 238\u2013245. ACM, Tampere (2002)"},{"doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative Filtering with Privacy. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, p. 45. IEEE Computer Society (2002)","key":"6_CR8","DOI":"10.1109\/SECPRI.2002.1004361"},{"unstructured":"Polat, H., Du, W.: Privacy-Preserving Collaborative Filtering Using Randomized Perturbation Techniques. In: Proceedings of the Third IEEE International Conference on Data Mining, p. 625. IEEE Computer Society (2003)","key":"6_CR9"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1145\/1066677.1066860","volume-title":"Proceedings of the 2005 ACM Symposium on Applied Computing","author":"H. Polat","year":"2005","unstructured":"Polat, H., Du, W.: SVD-based collaborative filtering with privacy. In: Proceedings of the 2005 ACM Symposium on Applied Computing, pp. 791\u2013795. ACM, Santa Fe (2005)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/1066157.1066163","volume-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data","author":"Z. Huang","year":"2005","unstructured":"Huang, Z., Du, W., Chen, B.: Deriving private information from randomized data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, pp. 37\u201348. ACM, Baltimore (2005)"},{"unstructured":"Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: On the Privacy Preserving Properties of Random Data Perturbation Techniques. In: Proceedings of the Third IEEE International Conference on Data Mining, p. 99. IEEE Computer Society (2003)","key":"6_CR12"},{"key":"6_CR13","first-page":"4","volume":"2","author":"R. Parameswaran","year":"2008","unstructured":"Parameswaran, R., Blough, D.M.: Privacy preserving data obfuscation for inherently clustered data. Int. J. Inf. Comput. Secur.\u00a02, 4\u201326 (2008)","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"6_CR14","volume-title":"12th IFIP\/IEEE International Symposium on Integrated Network Management","author":"A. Elmisery","year":"2011","unstructured":"Elmisery, A., Botvich, D.: Private Recommendation Service For IPTV System. In: 12th IFIP\/IEEE International Symposium on Integrated Network Management. IEEE, Dublin (2011)"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Schneier, B.: The MacGuffin block cipher algorithm, pp. 97\u2013110 (1995)","key":"6_CR15","DOI":"10.1007\/3-540-60590-8_8"},{"doi-asserted-by":"crossref","unstructured":"Elmisery, A.M., Huaiguo, F.: Privacy Preserving Distributed Learning Clustering Of HealthCare Data Using Cryptography Protocols. In: 34th IEEE Annual International Computer Software and Applications Workshops, Seoul, South Korea (2010)","key":"6_CR16","DOI":"10.1109\/COMPSACW.2010.33"},{"doi-asserted-by":"crossref","unstructured":"Fukunaga, K., Hostetler, L.: The estimation of the gradient of a density function, with applications in pattern recognition. IEEE Transactions on Information Theory\u00a021 (2003)","key":"6_CR17","DOI":"10.1109\/TIT.1975.1055330"},{"key":"6_CR18","first-page":"1","volume-title":"ACM SIGGRAPH Asia 2009 Papers","author":"K. Xu","year":"2009","unstructured":"Xu, K., Li, Y., Ju, T., Hu, S.-M., Liu, T.-Q.: Efficient affinity-based edit propagation using K-D tree. In: ACM SIGGRAPH Asia 2009 Papers, pp. 1\u20136. ACM, Yokohama (2009)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1531326.1531327","volume":"28","author":"A. Adams","year":"2009","unstructured":"Adams, A., Gelfand, N., Dolson, J., Levoy, M.: Gaussian KD-trees for fast high-dimensional filtering. ACM Trans. Graph.\u00a028, 1\u201312 (2009)","journal-title":"ACM Trans. Graph."},{"unstructured":"Lam, S., Herlocker, J.: MovieLens Data Sets. Department of Computer Science and Engineering at the University of Minnesota (2006)","key":"6_CR20"},{"key":"6_CR21","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1145\/312624.312682","volume-title":"Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"J.L. Herlocker","year":"1999","unstructured":"Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 230\u2013237. ACM, Berkeley (1999)"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J.L. Herlocker","year":"2004","unstructured":"Herlocker, J.L., Konstan, J.A., Terveen, L.G., Riedl, J.T.: Evaluating collaborative filtering recommender systems. ACM Trans. Inf. Syst.\u00a022, 5\u201353 (2004)","journal-title":"ACM Trans. Inf. Syst."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Mobile Information and Communication Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30244-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:58:36Z","timestamp":1743026316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30244-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642302435","9783642302442"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30244-2_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}