{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T21:57:41Z","timestamp":1758405461624,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/aiccsa.2008.4493598","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T13:37:07Z","timestamp":1209389827000},"page":"645-651","source":"Crossref","is-referenced-by-count":38,"title":["Privacy preserving ID3 using Gini Index over horizontally partitioned data"],"prefix":"10.1109","author":[{"given":"Saeed","family":"Samet","sequence":"first","affiliation":[]},{"given":"Ali","family":"Miri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"key":"22","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/PDCAT.2005.191","article-title":"privacy preserving id3 algorithm over horizontally partitioned data","author":"xiao","year":"2005","journal-title":"Parallel and Distributed Computing Applications and Technologies"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1023\/B:AMAI.0000018580.96245.c6"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/11562382_75"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"14","first-page":"448","article-title":"efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"SODA '01 Proceedings of the twelfth annual ACM-SIAM symposium on Discrete algorithms"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482297"},{"key":"12","first-page":"36","article-title":"privacy preserving data mining","author":"lindell","year":"2000","journal-title":"Crypto"},{"key":"21","doi-asserted-by":"crossref","first-page":"593","DOI":"10.3233\/JCS-2005-13401","article-title":"secure set intersection cardinality with application to association rule mining","volume":"13","author":"vaidya","year":"2005","journal-title":"Computers & Security"},{"year":"0","key":"3"},{"key":"20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/11535706_11","article-title":"privacy-preserving decision trees over vertically partitioned data","author":"vaidya","year":"2005","journal-title":"Data and Application Security (DBSec)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"journal-title":"Advances in Cryptology - EUROCRYPT 2004 International Conference on the Theory and Applications of Cryptographic Techniques Interlaken Switzerland May 2-6 2004 Proceedings volume 3027 of Lecture Notes in Computer Science","year":"2004","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00117831"},{"key":"9","first-page":"1","article-title":"building decision tree classifier on private data","author":"du","year":"2002","journal-title":"CRPITS'14 Proceedings of the IEEE international conference on Privacy security and data mining"},{"key":"8","first-page":"102","article-title":"privacy-preserving cooperative statistical analysis","author":"du","year":"2001","journal-title":"ACSAC '01 Proceedings of the 17th Annual Computer Security Applications Conference"}],"event":{"name":"2008 IEEE\/ACS International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2008,3,31]]},"location":"Doha, Qatar","end":{"date-parts":[[2008,4,4]]}},"container-title":["2008 IEEE\/ACS International Conference on Computer Systems and Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4488216\/4493499\/04493598.pdf?arnumber=4493598","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T15:54:49Z","timestamp":1557503689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4493598\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2008.4493598","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}