{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T00:06:58Z","timestamp":1705018018617},"reference-count":25,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T00:00:00Z","timestamp":1520553600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1093\/comjnl\/bxy024","type":"journal-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T12:11:02Z","timestamp":1519301462000},"page":"1123-1132","source":"Crossref","is-referenced-by-count":2,"title":["An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining"],"prefix":"10.1093","volume":"61","author":[{"given":"Rong","family":"Wang","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Yan","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"}]},{"given":"Tung-Shou","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan"}]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan"}]}],"member":"286","published-online":{"date-parts":[[2018,3,9]]},"reference":[{"key":"key\n\t\t\t\t20180724122910_bxy024C1","volume-title":"Data Mining: Concepts and Techniques.","author":"Han","year":"2011"},{"key":"key\n\t\t\t\t20180724122910_bxy024C2","author":"Standards for the privacy of individually identifiable health information","year":"2017"},{"key":"key\n\t\t\t\t20180724122910_bxy024C3","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/335191.335438","article-title":"Privacy-preserving data mining","volume":"29","author":"Agrawal","year":"2000","journal-title":"ACM SIGMOD Rec."},{"key":"key\n\t\t\t\t20180724122910_bxy024C4","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-Preserving Data Mining: Models and Algorithms.","author":"Aggarawal","year":"2008"},{"key":"key\n\t\t\t\t20180724122910_bxy024C5","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","article-title":"Information security in big data: privacy and data mining","volume":"2","author":"Xu","year":"2014","journal-title":"IEEE Access"},{"key":"key\n\t\t\t\t20180724122910_bxy024C6","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: a model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Unc. Fuzz. Knowl. Based Syst."},{"key":"key\n\t\t\t\t20180724122910_bxy024C7","author":"LeFevre","year":"2005"},{"key":"key\n\t\t\t\t20180724122910_bxy024C8","author":"Inan","year":"2009"},{"key":"key\n\t\t\t\t20180724122910_bxy024C9","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0378-3758(82)90058-1","article-title":"Data-swapping: a technique for disclosure control","volume":"6","author":"Dalenius","year":"1982","journal-title":"J. Stat. Plan. Inference"},{"key":"key\n\t\t\t\t20180724122910_bxy024C10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/348.349","article-title":"Practical data-swapping: the first steps","volume":"9","author":"Reiss","year":"1984","journal-title":"ACM Trans. Database Syst."},{"key":"key\n\t\t\t\t20180724122910_bxy024C11","author":"Moore","year":"1996"},{"key":"key\n\t\t\t\t20180724122910_bxy024C12","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/s10115-014-0751-1","article-title":"Secure support vector machines outsourcing with random linear transformation","volume":"44","author":"Lin","year":"2015","journal-title":"Knowl. Inf. Syst."},{"key":"key\n\t\t\t\t20180724122910_bxy024C13","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s10115-016-0923-2","article-title":"Privacy-preserving kernel k-means clustering outsourcing with random transformation","volume":"49","author":"Lin","year":"2016","journal-title":"Knowl. Inf. Syst."},{"key":"key\n\t\t\t\t20180724122910_bxy024C14","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1007\/s11227-013-0926-7","article-title":"Reversible privacy preserving data mining: a combination of difference expansion and privacy preserving","volume":"66","author":"Chen","year":"2013","journal-title":"J. Supercomput."},{"key":"key\n\t\t\t\t20180724122910_bxy024C15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.jss.2016.02.005","article-title":"A reversible data transform algorithm using integer transform for privacy-preserving data mining","volume":"117","author":"Lin","year":"2016","journal-title":"J. Syst. Softw."},{"key":"key\n\t\t\t\t20180724122910_bxy024C16","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"key\n\t\t\t\t20180724122910_bxy024C17","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.sigpro.2011.06.006","article-title":"Adaptive reversible data hiding scheme based on integer transform","volume":"92","author":"Peng","year":"2012","journal-title":"Signal Process."},{"key":"key\n\t\t\t\t20180724122910_bxy024C18","author":"Chang","year":"2014"},{"key":"key\n\t\t\t\t20180724122910_bxy024C19","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/772862.772865","article-title":"Cryptographic techniques for privacy-preserving data mining","volume":"4","author":"Pinkas","year":"2002","journal-title":"ACM SIGKDD Explor. Newsl."},{"key":"key\n\t\t\t\t20180724122910_bxy024C20","first-page":"111","article-title":"A quantitative comparison of disclosure control methods for microdata","volume":"1","author":"Domingo-Ferrer","year":"2001","journal-title":"Confidentiality Disclosure Data Access"},{"key":"key\n\t\t\t\t20180724122910_bxy024C21","author":"Domingo-Ferrer","year":"2001"},{"key":"key\n\t\t\t\t20180724122910_bxy024C22","author":"Rivest","year":"1992"},{"key":"key\n\t\t\t\t20180724122910_bxy024C23","author":"Deepakumara","year":"2001"},{"key":"key\n\t\t\t\t20180724122910_bxy024C24","author":"Uci machine learning repository","year":"2017"},{"key":"key\n\t\t\t\t20180724122910_bxy024C25","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"Witten","year":"2016"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/8\/1123\/25209176\/bxy024.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T11:05:40Z","timestamp":1570791940000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/8\/1123\/4925401"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,9]]},"references-count":25,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2018,3,9]]},"published-print":{"date-parts":[[2018,8,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy024","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,8]]},"published":{"date-parts":[[2018,3,9]]}}}