{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:34:55Z","timestamp":1769297695359,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642329456","type":"print"},{"value":"9783642329463","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32946-3_5","type":"book-chapter","created":{"date-parts":[[2012,8,14]],"date-time":"2012-08-14T04:56:16Z","timestamp":1344920176000},"page":"57-64","source":"Crossref","is-referenced-by-count":69,"title":["Deploying Secure Multi-Party Computation for Financial Data Analysis"],"prefix":"10.1007","author":[{"given":"Dan","family":"Bogdanov","sequence":"first","affiliation":[]},{"given":"Riivo","family":"Talviste","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Willemson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"SecureSCM. Technical report D9.1: Secure Computation Models and Frameworks (July 2008), \n                  \n                    http:\/\/www.securescm.org"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J.-P. Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 470\u2013488. Springer, Heidelberg (2008)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Batcher, K.E.: Sorting networks and their applications. In: Proc. of AFIPS 1968, pp. 307\u2013314. ACM (1968)","DOI":"10.1145\/1468075.1468121"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proc. of CCS 2008, pp. 257\u2013266. ACM (2008)","DOI":"10.1145\/1455770.1455804"},{"key":"5_CR5","unstructured":"Bernstein, D.J.: ChaCha, a variant of Salsa20 (2008), \n                  \n                    http:\/\/cr.yp.to\/chacha.html"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Proc. of AFIPS 1979, pp. 313\u2013317. AFIPS Press (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D. Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A Framework for Fast Privacy-Preserving Computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol.\u00a05283, pp. 192\u2013206. Springer, Heidelberg (2008)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. Cryptology ePrint Archive, Report 2011\/662 (2011)","DOI":"10.1007\/978-3-642-32946-3_5"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P. Bogetoft","year":"2009","unstructured":"Bogetoft, P., Christensen, D.L., Damg\u00e5rd, I., Geisler, M., Jakobsen, T., Kr\u00f8igaard, M., Nielsen, J.D., Nielsen, J.B., Nielsen, K., Pagter, J., Schwartzbach, M., Toft, T.: Secure Multiparty Computation Goes Live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol.\u00a05628, pp. 325\u2013343. Springer, Heidelberg (2009)"},{"key":"5_CR10","unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In: Proc. of USENIX Security Symposium 2010, pp. 223\u2013239 (2010)"},{"key":"5_CR11","unstructured":"Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Secure computation of surveys. In: EU Workshop on Secure Multiparty Protocols (2004)"},{"key":"5_CR12","unstructured":"Feigenbaum, J., Pinkas, B., Ryger, R., Saint-Jean, F.: Some requirements for adoption of privacy-preserving data mining. PORTIA Project White Paper (2005)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Henecka, W., K\u00f6gl, S., Sadeghi, A.-R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: Proc. of CCS 2010, pp. 451\u2013462. ACM (2010)","DOI":"10.1145\/1866307.1866358"},{"key":"5_CR14","unstructured":"Jagom\u00e4gis, R.: SecreC: a privacy-aware programming language with applications in data mining. Master\u2019s thesis, Inst. of Comp. Sci., Tartu University (2010)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Malka, L., Katz, J.: VMCrypt - modular software architecture for scalable secure computation. Cryptology ePrint Archive, Report 2010\/584 (2010)","DOI":"10.1145\/2046707.2046787"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5_CR17","unstructured":"Talviste, R.: Deploying secure multiparty computation for joint data analysis \u2014 a case study. Master\u2019s thesis, Inst. of Comp. Sci., Tartu University (2011)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32946-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:31:13Z","timestamp":1578522673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32946-3_5"}},"subtitle":["(Short Paper)"],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642329456","9783642329463"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32946-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}