{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T04:09:00Z","timestamp":1748578140896,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,7,26]],"date-time":"2015-07-26T00:00:00Z","timestamp":1437868800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"TurkTelekom","award":["3014-02"],"award-info":[{"award-number":["3014-02"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1007\/s10207-015-0296-7","type":"journal-article","created":{"date-parts":[[2015,7,25]],"date-time":"2015-07-25T06:56:06Z","timestamp":1437807366000},"page":"335-360","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A practical privacy-preserving targeted advertising scheme for IPTV users"],"prefix":"10.1007","volume":"15","author":[{"given":"Leyli Javid","family":"Khayati","sequence":"first","affiliation":[]},{"given":"Cengiz","family":"Orencik","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Savas","sequence":"additional","affiliation":[]},{"given":"Berkant","family":"Ustaoglu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,26]]},"reference":[{"key":"296_CR1","doi-asserted-by":"crossref","unstructured":"Khayati, L.J., Savas, E., Ustaoglu, B., Orencik, C.: Privacy-preserving targeted advertising scheme for iptv using the cloud. In: SECRYPT, pp. 74\u201383 (2012)","DOI":"10.5220\/0004021900740083"},{"key":"296_CR2","doi-asserted-by":"crossref","unstructured":"Kodialam, M., Lakshman, T., Mukherjee, S., Wang, L.: Online scheduling of targeted advertisements for iptv. In: 2010 Proceedings IEE, INFOCOM, pp. 1\u20139 (2010)","DOI":"10.1109\/INFCOM.2010.5461972"},{"key":"296_CR3","first-page":"185","volume":"9","author":"WH Min","year":"2009","unstructured":"Min, W.H., Cheong, Y.G.: An interactive-content technique based approach to generating personalized advertisement for privacy protection. HCI 9, 185\u2013191 (2009)","journal-title":"HCI"},{"key":"296_CR4","unstructured":"Kraus, J.: \u201cIptv privacy risks.\u201d http:\/\/www.cedmagazine.com\/articles\/2006\/02\/iptv-privacy-risks , February 2006. Retrieved 02 April (2013)"},{"key":"296_CR5","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Stoica, I., Zaharia, M.: Above the clouds: a berkeley view of cloud computing. In: Tech. Rep. UCB\/EECS-2009-28, EECS Department, University of California, Berkeley (2009)"},{"key":"296_CR6","unstructured":"\u201cOpinion 05\/2012 on cloud computing.\u201d http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2012\/wp196_en.pdf , July 2012. Retrieved 02 April (2013)"},{"key":"296_CR7","doi-asserted-by":"crossref","unstructured":"Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC\u201910, pp. 136\u2013149. Springer, Berlin (2010)","DOI":"10.1007\/978-3-642-14992-4_13"},{"key":"296_CR8","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"296_CR9","doi-asserted-by":"crossref","unstructured":"Boneh, D., Crescenzo, G.D., Ostrovsky, R., Persiano, G.: Public key encryption with keyword searches. In: Proceedings of Eurocrypt 2004. LNCS, vol. 3027, pp. 506\u2013522 (2004)","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"296_CR10","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., Lou, W.: Secure ranked keyword search over encrypted cloud data. In: ICDCS\u201910, pp. 253\u2013262 (2010)","DOI":"10.1109\/ICDCS.2010.34"},{"key":"296_CR11","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: IEEE INFOCOM (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"296_CR12","doi-asserted-by":"crossref","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Theory of Cryptography, vol. 4392 of Lecture Notes in Computer Science, pp. 535\u2013554, Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"296_CR13","doi-asserted-by":"crossref","unstructured":"Ballard, L., Kamara, S., Monrose, F.: Achieving efficient conjunctive keyword searches over encrypted data. In: vol. 3873, pp. 414\u2013426. Springer, Berlin (2005)","DOI":"10.1007\/11602897_35"},{"key":"296_CR14","doi-asserted-by":"crossref","unstructured":"Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: TCC \u201909: Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography, pp. 457\u2013473. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"296_CR15","doi-asserted-by":"crossref","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Rou, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J. (eds.) Advances in Cryptology CRYPTO 2013, vol. 8042 of Lecture Notes in Computer Science, pp. 353\u2013373. Springer Berlin (2013)","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"296_CR16","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., Pieprzyk, J.: An efficient scheme of common secure indices for conjunctive keyword-based retrieval on encrypted data. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) Information Security Applications, vol. 5379 of LNCS, pp. 145\u2013159. Springer, Berlin (2009)","DOI":"10.1007\/978-3-642-00306-6_11"},{"issue":"1","key":"296_CR17","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10619-013-7123-9","volume":"32","author":"C Orencik","year":"2014","unstructured":"Orencik, C., Savas, E.: An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking. Distrib. Parallel Databases 32(1), 119\u2013160 (2014)","journal-title":"Distrib. Parallel Databases"},{"key":"296_CR18","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s00530-010-0221-x","volume":"17","author":"D Diehn el","year":"2011","unstructured":"el Diehn, D., Abou-Tair, I., K\u00f6ster, I., H\u00f6fke, K.: Security and privacy requirements in interactive tv. Multimed. Syst. 17, 393\u2013408 (2011)","journal-title":"Multimed. Syst."},{"key":"296_CR19","first-page":"15:1","volume":"2007","author":"C Fontaine","year":"2007","unstructured":"Fontaine, C., Galand, F.: A survey of homomorphic encryption for nonspecialists. EURASIP J. Inf. Secur. 2007, 15:1\u201315:15 (2007)","journal-title":"EURASIP J. Inf. Secur."},{"key":"296_CR20","unstructured":"\u201cEu directive 95\/46\/ec - the data protection directive.\u201d http:\/\/www.dataprotection.ie\/docs\/EU-Directive-95-46-EC--Chapter-1\/92.htm , October 1995. Retrieved January 02, (2014)"},{"issue":"5","key":"296_CR21","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/s10207-007-0049-3","volume":"7","author":"E A\u00efmeur","year":"2008","unstructured":"A\u00efmeur, E., Brassard, G., Fernandez, J., Mani, : Alambic : a privacy-preserving recommender system for electronic commerce. Int. J. Inf. Secur. 7(5), 307\u2013334 (2008)","journal-title":"Int. J. Inf. Secur."},{"key":"296_CR22","first-page":"4:2","volume":"2009","author":"X Su","year":"2009","unstructured":"Su, X., Khoshgoftaar, T.M.: A survey of collaborative filtering techniques. Adv. Artif. Intell. 2009, 4:2\u20134:2 (2009)","journal-title":"Adv. Artif. Intell."},{"key":"296_CR23","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1023\/A:1020443909834","volume":"5","author":"J Herlocker","year":"2002","unstructured":"Herlocker, J., Konstan, J.A., Riedl, J.: An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms. Inf. Retr. 5, 287\u2013310 (2002)","journal-title":"Inf. Retr."},{"key":"296_CR24","unstructured":"CAT, \u201c http:\/\/anony-toolkit.sourceforge.net\/ \u201d (2009)"},{"key":"296_CR25","unstructured":"MovieLens, \u201c http:\/\/www.grouplens.org\/node\/12 .\u201d"},{"key":"296_CR26","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS \u201906, pp. 79\u201388, ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"296_CR27","doi-asserted-by":"crossref","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Advances in Cryptology CRYPTO 96, vol. 1109 of Lecture Notes in Computer Science, pp. 1\u201315, Springer, Berlin (1996)","DOI":"10.1007\/3-540-68697-5_1"},{"key":"296_CR28","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 111\u2013125. IEEE, Los Alamitos, CA (2008)","DOI":"10.1109\/SP.2008.33"},{"key":"296_CR29","unstructured":"Rappe, D.: Homomorphic cryptosystems and their applications. PhD thesis, University of Dortmund, Dortmund (2004)"},{"key":"296_CR30","doi-asserted-by":"crossref","unstructured":"Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. In: Lam, K.-Y., Okamoto, E., Xing, C. (eds.) Advances in Cryptology\u2014ASIACRYPT\u201999, vol. 1716 of Lecture Notes in Computer Science, pp. 165\u2013179, Springer, Berlin (1999)","DOI":"10.1007\/978-3-540-48000-6_14"},{"key":"296_CR31","doi-asserted-by":"crossref","unstructured":"Bellare, M.: New proofs for NMAC and HMAC: Security without collision-resistance. In: Proceedings of the 26th Annual International Conference on Advances in Cryptology, CRYPTO\u201906, pp. 602\u2013619. Springer, Berlin (2006)","DOI":"10.1007\/11818175_36"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0296-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-015-0296-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-015-0296-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T17:54:03Z","timestamp":1748541243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-015-0296-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,26]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,8]]}},"alternative-id":["296"],"URL":"https:\/\/doi.org\/10.1007\/s10207-015-0296-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2015,7,26]]}}}