{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:33:22Z","timestamp":1725744802972},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642408458"},{"type":"electronic","value":"9783642408465"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40846-5_46","type":"book-chapter","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T15:08:26Z","timestamp":1376492906000},"page":"462-471","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Privacy-Preserving Minimal Distance Classification"],"prefix":"10.1007","author":[{"given":"Bartosz","family":"Krawczyk","sequence":"first","affiliation":[]},{"given":"Micha\u0142","family":"Wo\u017aniak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","volume-title":"Introduction to Machine Learning","author":"E. Alpaydin","year":"2010","unstructured":"Alpaydin, E.: Introduction to Machine Learning, 2nd edn. The MIT Press, London (2010)","edition":"2"},{"key":"46_CR2","unstructured":"Asuncion, A., Newman, D.J.: UCI Machine Learning Repository. University of California, School of Information and Computer Science, Irvine (2007), \n                    \n                      http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"46_CR3","unstructured":"Chitti, S., Liu, L., Xiong, L.: Mining Multiple Private Databases using Privacy Preserving kNN Classifier, Technical Reports TR-2006-008, Emory University (2006)"},{"key":"46_CR4","doi-asserted-by":"crossref","unstructured":"Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving data mining. SIGKDD Explorations, 28\u201334 (2002)","DOI":"10.1145\/772862.772867"},{"issue":"1","key":"46_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1967.1053964","volume":"13","author":"T.M. Cover","year":"1967","unstructured":"Cover, T.M., Hart, P.E.: Nearest neighbor pattern classification. IEEE Trans. on Inform. Theory\u00a013(1), 21\u201327 (1967)","journal-title":"IEEE Trans. on Inform. Theory"},{"key":"46_CR6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TPAMI.1981.4767052","volume":"3","author":"L. Devroye","year":"1981","unstructured":"Devroye, L.: On the inequality of cover and hart in nearest neighbor discrimination. IEEE Trans. on Pat. Anal. and Mach. Intel.\u00a03, 75\u201378 (1981)","journal-title":"IEEE Trans. on Pat. Anal. and Mach. Intel."},{"key":"46_CR7","volume-title":"Data Mining: Concepts and Techniques","author":"J. Han","year":"2005","unstructured":"Han, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann Publ. Inc., San Francisco (2005)"},{"issue":"3","key":"46_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00145-001-0019-2","volume":"15","author":"Y. Lindell","year":"2004","unstructured":"Lindell, Y., Pinkas, B.: Privacy Preserving Data Mining. Journal of Cryptology\u00a015(3), 177\u2013206 (2004)","journal-title":"Journal of Cryptology"},{"issue":"2","key":"46_CR9","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s00145-008-9036-8","volume":"22","author":"Y. Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: A proof of security of yao\u2019s protocol for two-party computation. Journal of Cryptology\u00a022(2), 161\u2013188 (2009)","journal-title":"Journal of Cryptology"},{"key":"46_CR10","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1023\/A:1011881522593","volume":"3","author":"J.H. Moor","year":"2001","unstructured":"Moor, J.H.: The future of computer ethics: You ain\u2019t seen nothin\u2019 yet! Ethics and Information Technology\u00a03, 89\u201391 (2001)","journal-title":"Ethics and Information Technology"},{"key":"46_CR11","unstructured":"Nissenbaum, H.: Can we Protect Privacy in Public? In: Computer Ethics Philosophical Enquiry ACM\/SIGCAS Conference, Rotterdam, The Netherlands (1997)"},{"key":"46_CR12","unstructured":"Westin, A.F.: Privacy and Freedom. The Bodley Head Ltd. (1970)"}],"container-title":["Lecture Notes in Computer Science","Hybrid Artificial Intelligent Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40846-5_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T05:10:00Z","timestamp":1539234600000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40846-5_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642408458","9783642408465"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40846-5_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}