{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:16:14Z","timestamp":1725754574331},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1109\/ciss.2016.7460489","type":"proceedings-article","created":{"date-parts":[[2016,4,28]],"date-time":"2016-04-28T20:18:24Z","timestamp":1461874704000},"page":"128-132","source":"Crossref","is-referenced-by-count":7,"title":["Differentially private multi-party computation"],"prefix":"10.1109","author":[{"given":"Peter","family":"Kairouz","sequence":"first","affiliation":[]},{"given":"Sewoong","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Pramod","family":"Viswanath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.53"},{"key":"ref11","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","author":"kairouz","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref15","article-title":"The composition theorem for differential privacy","author":"kairouz","year":"2013","journal-title":"arXiv 1311 0776"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177729032"},{"journal-title":"Elements of Information Theory","year":"2012","author":"cover","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_25"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.14"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref1","article-title":"Secure multi-party differential privacy","author":"kairouz","year":"2015","journal-title":"Advances in neural information processing systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_17"}],"event":{"name":"2016 Annual Conference on Information Science and Systems (CISS)","start":{"date-parts":[[2016,3,16]]},"location":"Princeton, NJ, USA","end":{"date-parts":[[2016,3,18]]}},"container-title":["2016 Annual Conference on Information Science and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7457733\/7460463\/07460489.pdf?arnumber=7460489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T20:22:34Z","timestamp":1474662154000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7460489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ciss.2016.7460489","relation":{},"subject":[],"published":{"date-parts":[[2016,3]]}}}