{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:00:10Z","timestamp":1725516010651},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/atnac.2015.7366786","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T16:36:12Z","timestamp":1451925372000},"page":"38-43","source":"Crossref","is-referenced-by-count":0,"title":["Verifiably anonymous data collection on web"],"prefix":"10.1109","author":[{"given":"Huafei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Shuoping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Peipei","family":"Tang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Research advances on privacy-preserving data mining","author":"zhang","year":"2013","journal-title":"Application Research of Computers"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081909"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2381716.2381803"},{"key":"ref30","first-page":"552","article-title":"How to Leak a Secret","author":"rivest","year":"0","journal-title":"ASIACRYPT 2001"},{"journal-title":"Secure Data Mining","year":"2015","author":"zhan","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150415"},{"journal-title":"Modular Design of Secure yet Practical Cryptographic Protocols","year":"1996","author":"cramer","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2213556.2213570"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"journal-title":"Digital Rights Management Systems and Data Privacy","year":"2015","author":"dimitriou","key":"ref14"},{"key":"ref15","first-page":"119","article-title":"A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System","author":"damg?ard","year":"0","journal-title":"Public Key Crytography 2001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_32"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2015.02.042"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2014.2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-13731-5_64"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872771"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_3"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557034"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2398440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2043174.2043199"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2304717"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/375551.375602"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773174"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"key":"ref21","first-page":"217","article-title":"Privacy preserving mining of association rules","author":"evfirnievski","year":"0","journal-title":"KDD 2002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2185376.2185390"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_16"},{"journal-title":"How to Bootstrap Anonymous Communication","year":"2015","author":"jakobsen","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2315619"}],"event":{"name":"2015 International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2015,11,18]]},"location":"Sydney, Australia","end":{"date-parts":[[2015,11,20]]}},"container-title":["2015 International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7363403\/7366770\/07366786.pdf?arnumber=7366786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T23:40:28Z","timestamp":1490398828000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366786\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/atnac.2015.7366786","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}