{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:21:32Z","timestamp":1729678892221,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/pccc.2015.7410266","type":"proceedings-article","created":{"date-parts":[[2016,2,19]],"date-time":"2016-02-19T18:24:03Z","timestamp":1455906243000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-preserving min and k-th min computations with fully homomorphic encryption"],"prefix":"10.1109","author":[{"family":"Bingbing Jiang","sequence":"first","affiliation":[]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1568318.1568324"},{"key":"ref30","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computations"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2432814"},{"key":"ref11","first-page":"118","article-title":"I have a dream! (differently private smart metering)","volume":"6985","author":"aes","year":"2011","journal-title":"Information Hiding ser Lecture Notes in Computer Science"},{"key":"ref12","article-title":"Secured histories:computing group statistics on encrypted data while preserving individual privacy","author":"rieffel","year":"2010","journal-title":"CoRR vol absI1012 2152"},{"key":"ref13","article-title":"Privacy-preserving aggragation of time-series data","author":"shi","year":"2011","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935010"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications","volume":"23","author":"lu","year":"2012","journal-title":"Parallel and Distributed Systems IEEE Transactions on"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132944"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935177"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791226"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814442"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462147"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814468"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.31"},{"key":"ref7","first-page":"1","article-title":"Efficient and privacy-aware data aggregation in mobile sensing","author":"li","year":"2012","journal-title":"ICNP IEEE"},{"key":"ref2","first-page":"85","article-title":"Vtrack:accurate, energy-aware road traffic dely estimation using mobile phones","author":"thiagarajan","year":"0","journal-title":"Sensys"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"journal-title":"Mobile Millennium-Participstory Traffic Estimation Using Mobile Phones","year":"2009","author":"herring","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref25","first-page":"483","article-title":"Multiparty Computation with Low Communicaton, Computation and Interaction via Threshold FHE","author":"asharov","year":"2012","journal-title":"EUROCRYPT 2012 LNCS 7237"}],"event":{"name":"2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)","start":{"date-parts":[[2015,12,14]]},"location":"Nanjing, China","end":{"date-parts":[[2015,12,16]]}},"container-title":["2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7399586\/7410258\/07410266.pdf?arnumber=7410266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T02:21:08Z","timestamp":1498270868000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7410266\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/pccc.2015.7410266","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}