{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,7]],"date-time":"2026-01-07T08:05:22Z","timestamp":1767773122662,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732393","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"2286-2289","source":"Crossref","is-referenced-by-count":12,"title":["Distributed threshold k-means clustering for privacy preserving data mining"],"prefix":"10.1109","author":[{"given":"Vadlana","family":"Baby","sequence":"first","affiliation":[]},{"given":"N. Subhash","family":"Chandra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"253","volume":"2587","author":"pieprzyk","year":"2003","journal-title":"Ideal threshold schemes from MDS codes ICSC"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772865"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0006-6"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/974121.974131"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016910381"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13601-6_17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0019-2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref5","first-page":"313","volume":"48","author":"blakley","year":"1979","journal-title":"Safeguarding Cryptographic Keys"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39466-4_27"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1504\/IJTMCC.2014.067378","article-title":"Computationally perfect secret sharing schemes Based on MDS codes","volume":"2","author":"naidu","year":"2014","journal-title":"International Journal of Trust Management in Computing and Communications (IJTMCC)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1379287.1379291"},{"journal-title":"Efficient Secure Comparison Protocols-Cryptology ePrint","year":"0","author":"couteau","key":"ref21"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732393.pdf?arnumber=7732393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T03:06:43Z","timestamp":1498360003000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732393","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}