{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:46Z","timestamp":1766281006010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T00:00:00Z","timestamp":1363564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2457317.2457343","type":"proceedings-article","created":{"date-parts":[[2013,3,26]],"date-time":"2013-03-26T12:25:54Z","timestamp":1364300754000},"page":"155-163","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":48,"title":["Secure multiparty aggregation with differential privacy"],"prefix":"10.1145","author":[{"given":"Slawomir","family":"Goryczka","sequence":"first","affiliation":[{"name":"Emory University"}]},{"given":"Li","family":"Xiong","sequence":"additional","affiliation":[{"name":"Emory University"}]},{"given":"Vaidy","family":"Sunderam","sequence":"additional","affiliation":[{"name":"Emory University"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Report of the August 2010 Multi-Agency Workshop on InfoSymbiotics\/DDDAS The Power of Dynamic Data Driven Applications Systems. Workshop sponsored by: Air Force Office of Scientific Research and National Science Foundation. Report of the August 2010 Multi-Agency Workshop on InfoSymbiotics\/DDDAS The Power of Dynamic Data Driven Applications Systems . Workshop sponsored by: Air Force Office of Scientific Research and National Science Foundation."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2042445.2042457"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02293108"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706645"},{"key":"e_1_3_2_1_6_1","volume-title":"Workshop on World-Sensor-Web (WSW): Mobile Device Centric Sensor Networks and Applications","author":"Burke J.","year":"2006","unstructured":"J. Burke , D. Estrin , M. Hansen , A. Parker , N. Ramanathan , S. Reddy , and M. B. Srivastava . Participatory sensing . In Workshop on World-Sensor-Web (WSW): Mobile Device Centric Sensor Networks and Applications , 2006 . J. Burke, D. Estrin, M. Hansen, A. Parker, N. Ramanathan, S. Reddy, and M. B. Srivastava. Participatory sensing. In Workshop on World-Sensor-Web (WSW): Mobile Device Centric Sensor Networks and Applications, 2006."},{"key":"e_1_3_2_1_7_1","volume-title":"19th USENIX Security Symposium","author":"Burkhart M.","year":"2010","unstructured":"M. Burkhart , M. Strasser , D. Many , and X. Dimitropoulos . SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics . In 19th USENIX Security Symposium , August 2010 . M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos. SEPIA: Privacy-preserving aggregation of multi-domain network events and statistics. In 19th USENIX Security Symposium, August 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715687"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/648118.746742"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_12"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866739.1866758"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/19478.19480"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.154"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536464"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography","author":"Goldreich O.","year":"2004","unstructured":"O. Goldreich . Foundations of Cryptography : Volume 2 , Basic Applications. Cambridge University Press , 2004 . O. Goldreich. Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_20"},{"key":"e_1_3_2_1_27_1","first-page":"97","article-title":"Self-surveillance privacy","author":"Kang J.","year":"2012","unstructured":"J. Kang , K. Shilton , D. Estrin , J. Burke , and M. Hansen . Self-surveillance privacy . Iowa Law Review , 97 , 2012 . J. Kang, K. Shilton, D. Estrin, J. Burke, and M. Hansen. Self-surveillance privacy. Iowa Law Review, 97, 2012.","journal-title":"Iowa Law Review"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989345"},{"key":"e_1_3_2_1_29_1","series-title":"Progress in Mathematics Series","volume-title":"Economics, Engineering, and Finance","author":"Kotz S.","year":"2001","unstructured":"S. Kotz , T. Kozubowski , and K. Podg\u00f3rski . The Laplace Distribution and Generalizations: A Revisit with Applications to Communications , Economics, Engineering, and Finance . Progress in Mathematics Series . Birkh\u00e4user Boston , 2001 . S. Kotz, T. Kozubowski, and K. Podg\u00f3rski. The Laplace Distribution and Generalizations: A Revisit with Applications to Communications, Economics, Engineering, and Finance. Progress in Mathematics Series. Birkh\u00e4user Boston, 2001."},{"key":"e_1_3_2_1_30_1","volume-title":"Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive","author":"Lindell Y.","year":"2008","unstructured":"Y. Lindell and B. Pinkas . Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive , 2008 :197, 2008. Y. Lindell and B. Pinkas. Secure multiparty computation for privacy-preserving data mining. IACR Cryptology ePrint Archive, 2008:197, 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/1006063"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v005.i08"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555823"},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/978-3-642-17955-6_4","volume-title":"Information Security Applications","author":"Nishide T.","year":"2011","unstructured":"T. Nishide and K. Sakurai . Distributed Paillier cryptosystem without trusted dealer . In Y. Chung and M. Yung, editors, Information Security Applications , volume 6513 of Lecture Notes in Computer Science , pages 44 -- 60 , 2011 . T. Nishide and K. Sakurai. Distributed Paillier cryptosystem without trusted dealer. In Y. Chung and M. Yung, editors, Information Security Applications, volume 6513 of Lecture Notes in Computer Science, pages 44--60, 2011."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_36_1","volume-title":"Encryption-based Techniques For Privacy Preserving Data Mining. In Proc. of UNECE\/Eurostat Work Session on SDC","author":"Pedersen T. B.","year":"2007","unstructured":"T. B. Pedersen , Y. Saygin , and E. Sava\u015f . Secret Sharing vs . Encryption-based Techniques For Privacy Preserving Data Mining. In Proc. of UNECE\/Eurostat Work Session on SDC , 2007 . T. B. Pedersen, Y. Saygin, and E. Sava\u015f. Secret Sharing vs. Encryption-based Techniques For Privacy Preserving Data Mining. In Proc. of UNECE\/Eurostat Work Session on SDC, 2007."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807247"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_40_1","volume-title":"NDSS","author":"Shi E.","year":"2011","unstructured":"E. Shi , T.-H. H. Chan , E. G. Rieffel , R. Chow , and D. Song . Privacy-preserving aggregation of time-series data . In NDSS , 2011 . E. Shi, T.-H. H. Chan, E. G. Rieffel, R. Chow, and D. Song. Privacy-preserving aggregation of time-series data. In NDSS, 2011."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592778"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.108"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"}],"event":{"name":"EDBT\/ICDT '13: Joint 2013 EDBT\/ICDT Conferences","acronym":"EDBT\/ICDT '13","location":"Genoa Italy"},"container-title":["Proceedings of the Joint EDBT\/ICDT 2013 Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2457317.2457343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:19:12Z","timestamp":1750234752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2457317.2457343"}},"subtitle":["a comparative study"],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":44,"alternative-id":["10.1145\/2457317.2457343","10.1145\/2457317"],"URL":"https:\/\/doi.org\/10.1145\/2457317.2457343","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}