{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T09:46:26Z","timestamp":1769075186419,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T00:00:00Z","timestamp":1401840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,6,4]]},"DOI":"10.1145\/2590296.2590332","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:18:31Z","timestamp":1401473911000},"page":"123-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Privacy of outsourced k-means clustering"],"prefix":"10.1145","author":[{"given":"Dongxi","family":"Liu","sequence":"first","affiliation":[{"name":"CSIRO, Marsfield, Australia"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, USA"}]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[{"name":"Victoria University, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2014,6,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.151"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"M.\n      Barni P.\n      Failla V.\n      Kolesnikov R.\n      Lazzeretti A.-R.\n      Sadeghi and \n      T.\n      Schneider\n  . \n  Secure evaluation of private linear branching programs with medical applications\n  . In M. Backes and P. Ning editors ESORICS volume \n  5789\n   of \n  Lecture Notes in Computer Science pages \n  424\n  --\n  439\n  . \n  Springer 2009\n  .   M. Barni P. Failla V. Kolesnikov R. Lazzeretti A.-R. Sadeghi and T. Schneider. Secure evaluation of private linear branching programs with medical applications. In M. Backes and P. Ning editors ESORICS volume 5789 of Lecture Notes in Computer Science pages 424--439. Springer 2009.","DOI":"10.1007\/978-3-642-04444-1_26"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987281"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Z.\n      Brakerski\n     and \n      V.\n      Vaikuntanathan\n  . \n  Fully homomorphic encryption from ring-lwe and security for key dependent messages\n  . In P. Rogaway editor CRYPTO volume \n  6841\n   of \n  Lecture Notes in Computer Science pages \n  505\n  --\n  524\n  . \n  Springer 2011\n  .   Z. Brakerski and V. Vaikuntanathan. Fully homomorphic encryption from ring-lwe and security for key dependent messages. In P. Rogaway editor CRYPTO volume 6841 of Lecture Notes in Computer Science pages 505--524. Springer 2011.","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315307"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315306"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488678"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"S.\n      Goldwasser Y. T.\n      Kalai R. A.\n      Popa V.\n      Vaikuntanathan and \n      N.\n      Zeldovich\n  . \n  How to run turing machines on encrypted data\n  . In R. Canetti and J. A. Garay editors CRYPTO (2) volume \n  8043\n   of \n  Lecture Notes in Computer Science pages \n  536\n  --\n  553\n  . \n  Springer 2013\n  .  S. Goldwasser Y. T. Kalai R. A. Popa V. Vaikuntanathan and N. Zeldovich. How to run turing machines on encrypted data. In R. Canetti and J. A. Garay editors CRYPTO (2) volume 8043 of Lecture Notes in Computer Science pages 536--553. Springer 2013.","DOI":"10.1007\/978-3-642-40084-1_30"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081942"},{"key":"e_1_3_2_1_14_1","volume-title":"Data Mining: Concepts and Techniques","author":"Jiawei Han M. K.","year":"2011","unstructured":"M. K. Jiawei Han and J. Pei . Data Mining: Concepts and Techniques , 3 rd ed. Morgan Kaufmann Publishers , 2011 . M. K. Jiawei Han and J. Pei. Data Mining: Concepts and Techniques, 3rd ed. Morgan Kaufmann Publishers, 2011.","edition":"3"},{"key":"e_1_3_2_1_15_1","first-page":"99","volume-title":"Proceedings of the Third IEEE International Conference on Data Mining, ICDM '03","author":"Kargupta H.","unstructured":"H. Kargupta , S. Datta , Q. Wang , and K. Sivakumar . On the privacy preserving properties of random data perturbation techniques . In Proceedings of the Third IEEE International Conference on Data Mining, ICDM '03 , pages 99 --, Washington, DC, USA, 2003. IEEE Computer Society. H. Kargupta, S. Datta, Q. Wang, and K. Sivakumar. On the privacy preserving properties of random data perturbation techniques. In Proceedings of the Third IEEE International Conference on Data Mining, ICDM '03, pages 99--, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"Katz J.","year":"2007","unstructured":"J. Katz and Y. Lindell . Introduction to Modern Cryptography (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC , 2007 . J. Katz and Y. Lindell. Introduction to Modern Cryptography (Chapman & Hall\/Crc Cryptography and Network Security Series). Chapman & Hall\/CRC, 2007."},{"key":"e_1_3_2_1_17_1","volume-title":"Homomorphic encryption for database querying. Inernational Patent Application No.: PCT\/AU2013\/000674 (Accessible via http:\/\/patentscope.wipo.int\/search\/en\/WO2013188929)","author":"Liu D.","year":"2013","unstructured":"D. Liu . Homomorphic encryption for database querying. Inernational Patent Application No.: PCT\/AU2013\/000674 (Accessible via http:\/\/patentscope.wipo.int\/search\/en\/WO2013188929) , 2013 . D. Liu. Homomorphic encryption for database querying. Inernational Patent Application No.: PCT\/AU2013\/000674 (Accessible via http:\/\/patentscope.wipo.int\/search\/en\/WO2013188929), 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.65"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2006.75"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.06.001"}],"event":{"name":"ASIA CCS '14: 9th ACM Symposium on Information, Computer and Communications Security","location":"Kyoto Japan","acronym":"ASIA CCS '14","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 9th ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590332","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2590296.2590332","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:55:52Z","timestamp":1750229752000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2590296.2590332"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,4]]},"references-count":22,"alternative-id":["10.1145\/2590296.2590332","10.1145\/2590296"],"URL":"https:\/\/doi.org\/10.1145\/2590296.2590332","relation":{},"subject":[],"published":{"date-parts":[[2014,6,4]]},"assertion":[{"value":"2014-06-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}