{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:04:25Z","timestamp":1704845065655},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2009,7,1]],"date-time":"2009-07-01T00:00:00Z","timestamp":1246406400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. C"],"published-print":{"date-parts":[[2009,7]]},"DOI":"10.1109\/tsmcc.2009.2016430","type":"journal-article","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T02:26:39Z","timestamp":1240021599000},"page":"440-447","source":"Crossref","is-referenced-by-count":21,"title":["Toward Empirical Aspects of Secure Scalar Product"],"prefix":"10.1109","volume":"39","author":[{"family":"I-Cheng Wang","sequence":"first","affiliation":[]},{"family":"Chih-hao Shen","sequence":"additional","affiliation":[]},{"given":"J.","family":"Zhan","sequence":"additional","affiliation":[]},{"family":"Tsan-sheng Hsu","sequence":"additional","affiliation":[]},{"family":"Churn-Jung Liau","sequence":"additional","affiliation":[]},{"family":"Da-Wei Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"du","year":"2001","journal-title":"A study of several specific secure two-party computation problems"},{"key":"ref11","first-page":"165","article-title":"secure multi-party computational geometry","volume":"2125","author":"atallah","year":"0"},{"key":"ref12","first-page":"102","author":"du","year":"0","journal-title":"Proc 17th Annu Comput Secur Appl Conf (ACSAC 2001)"},{"key":"ref13","first-page":"273","author":"du","year":"0","journal-title":"Proc 14th IEEE Workshop Comput Secur Found (CSFW 2001)"},{"key":"ref14","first-page":"486","author":"bunn","year":"0","journal-title":"Proc 14th ACM Conf Comput Commun Secur (CCS 2007)"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1007\/11535706_9","article-title":"secrecy of two-party secure computation","volume":"3654","author":"chiang","year":"2005","journal-title":"Lect Notes Comput Sci"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/11805588_22"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLC.2007.4370663"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref4","first-page":"446","author":"beaver","year":"0","journal-title":"Proc 29th Annu ACM Symp Theory Comput (STOC 1997)"},{"key":"ref3","first-page":"127","author":"du","year":"0","journal-title":"Proc 2002 Workshop New Security Paradigms"},{"key":"ref6","first-page":"1","author":"ben-or","year":"0","journal-title":"Proc 25th Annu ACM Symp Theory of Computing (STOC)"},{"key":"ref5","first-page":"104","article-title":"on private scalar product computation for privacy-preserving data mining","author":"goethals","year":"0","journal-title":"Proc Int Conf Inf Secur Cryptol V (ICISC 2004)"},{"key":"ref8","first-page":"20","author":"kilian","year":"0","journal-title":"Proc 25th Annu ACM Symp Theory of Computing (STOC)"},{"key":"ref7","first-page":"287","article-title":"fairplaya secure two-party computation system","author":"malkhi","year":"2004","journal-title":"Proc 10th Usenix Security Symp"},{"key":"ref2","first-page":"218","author":"goldreich","year":"0","journal-title":"Proc 19th Annu ACM Symp Theory Comput (STOC 1987)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref9","first-page":"553","author":"kilian","year":"0","journal-title":"Proc 23rd Annu ACM Symp Theory Comput (STOC 1991)"},{"key":"ref20","first-page":"448","author":"naor","year":"0","journal-title":"Proc 11th Annu ACM-SIAM Symp Discrete Algorithms (SODA 2000)"},{"key":"ref21","author":"turner","year":"1966","journal-title":"Inverse of the vandermonde matrix with applications"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5326\/5068840\/04815464.pdf?arnumber=4815464","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:02:04Z","timestamp":1633910524000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4815464\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,7]]},"references-count":21,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tsmcc.2009.2016430","relation":{},"ISSN":["1094-6977","1558-2442"],"issn-type":[{"value":"1094-6977","type":"print"},{"value":"1558-2442","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,7]]}}}