{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T06:51:44Z","timestamp":1773557504537,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,26]]},"DOI":"10.1145\/1161366.1161393","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"146-151","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":87,"title":["A privacy-preserving protocol for neural-network-based computation"],"prefix":"10.1145","author":[{"given":"M.","family":"Barni","sequence":"first","affiliation":[{"name":"University of Siena"}]},{"given":"C.","family":"Orlandi","sequence":"additional","affiliation":[{"name":"University of Florence"}]},{"given":"A.","family":"Piva","sequence":"additional","affiliation":[{"name":"University of Florence"}]}],"member":"320","published-online":{"date-parts":[[2006,9,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"7th ICISC","author":"Goethals H. L. B.","year":"2004","unstructured":"H. L. B. Goethals , S. Laur and T. Mielikainen . On secure scalar product computation for privacy-preserving data mining . In 7th ICISC , 2004 .]] H. L. B. Goethals, S. Laur and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In 7th ICISC, 2004.]]"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/648118.746742"},{"key":"e_1_3_2_1_5_1","first-page":"102","volume-title":"Proceedings of the 17th Annual Computer Security Applications Conference","author":"Du W.","year":"2001","unstructured":"W. Du and M. J. Atallah . Privacy-preserving statistical analysis . In Proceedings of the 17th Annual Computer Security Applications Conference , pages 102 -- 110 , New Orleans, Louisiana, USA , December 10-14 2001 .]] W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 102--110, New Orleans, Louisiana, USA, December 10-14 2001.]]"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.47"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2004.833860"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes is Computer Science","first-page":"223","volume-title":"Proceedings of Eurocrypt'99","author":"Pailler P.","year":"1999","unstructured":"P. Pailler . Public-key cryptosystems based on composite degree residuosity classes . In Proceedings of Eurocrypt'99 , Lecture Notes is Computer Science vol. 1592 , pages 223 -- 238 . Springer-Verlag , 1999 .]] P. Pailler. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt'99, Lecture Notes is Computer Science vol. 1592, pages 223--238. Springer-Verlag, 1999.]]"},{"key":"e_1_3_2_1_11_1","volume-title":"Workshop on Privacy and Security Aspects of Data Mining","author":"Ravikumar P.","year":"2004","unstructured":"P. Ravikumar , W. Cohen , and S. Fienberg . A secure protocol for computing string distance metrics . In Workshop on Privacy and Security Aspects of Data Mining , Brighton, UK , November 1 2004 .]] P. Ravikumar, W. Cohen, and S. Fienberg. A secure protocol for computing string distance metrics. In Workshop on Privacy and Security Aspects of Data Mining, Brighton, UK, November 1 2004.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_1_13_1","first-page":"273","volume-title":"14th IEEE Computer Security Foundations Workshop","author":"Du W.","year":"2001","unstructured":"W. Du and M. J. Atallah . Privacy-preserving cooperative scientific computations . In 14th IEEE Computer Security Foundations Workshop , pages 273 -- 282 , Nova Scotia, Canada , June 11-13 2001 .]] W. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundations Workshop, pages 273--282, Nova Scotia, Canada, June 11-13 2001.]]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014145"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"}],"event":{"name":"MM&Sec '06: Multimedia and Security Workshop","location":"Geneva Switzerland","acronym":"MM&Sec '06","sponsor":["ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 8th workshop on Multimedia and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161366.1161393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T02:36:00Z","timestamp":1673058960000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161366.1161393"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,26]]},"references-count":15,"alternative-id":["10.1145\/1161366.1161393","10.1145\/1161366"],"URL":"https:\/\/doi.org\/10.1145\/1161366.1161393","relation":{},"subject":[],"published":{"date-parts":[[2006,9,26]]},"assertion":[{"value":"2006-09-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}