{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:15Z","timestamp":1750306275964,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905316","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Secure Sum Computation for Insecure Networks"],"prefix":"10.1145","author":[{"given":"Rashid","family":"Sheikh","sequence":"first","affiliation":[{"name":"Mewar University, Chittorgarh, India"}]},{"given":"Durgesh Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"Sri Aurobindo Institute of Technology, Indore, India"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Secure_multi-party_computation  http:\/\/en.wikipedia.org\/wiki\/Secure_multi-party_computation"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/772862.772867"},{"key":"e_1_3_2_1_3_1","volume-title":"USA","volume":"7","author":"Sheikh R.","year":"2010","unstructured":"R. Sheikh , B. Kumar and D. K. Mishra , \" Changing Neighbors k- Secure Sum Protocol for Secure Multiparty Computation,\" International Journal of Computer Science and Information Security , USA , Vol. 7 No. 1, Jan. 2010 . R. Sheikh, B. Kumar and D. K. Mishra, \"Changing Neighbors k- Secure Sum Protocol for Secure Multiparty Computation,\" International Journal of Computer Science and Information Security, USA, Vol. 7 No. 1, Jan. 2010."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"184","volume":"6","author":"Sheikh R.","year":"2009","unstructured":"R. Sheikh , B. Kumar and D. K. Mishra , \"Privacy-Preserving k- Secure Sum Protocol,\" in the International Journal of Computer Science and Information Security, USA , Vol. 6 No. 2 , pp. 184 -- 188 , Nov. 2009 . R. Sheikh, B. Kumar and D. K. Mishra, \"Privacy-Preserving k- Secure Sum Protocol,\" in the International Journal of Computer Science and Information Security, USA, Vol. 6 No. 2, pp. 184--188, Nov. 2009.","journal-title":"\"Privacy-Preserving k- Secure Sum Protocol,\" in the International Journal of Computer Science and Information Security, USA"},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"68","volume":"2","author":"Sheikh R.","year":"2010","unstructured":"R. Sheikh , B. Kumar and D. K. Mishra , \"A Distributed k-Secure Sum Protocol for Secure Multi-party Computation,\" in the Journal of Computing, USA , Vol. 2 , Issue 3 , pages 68 -- 72 , Mar. 2010 . R. Sheikh, B. Kumar and D. K. Mishra, \"A Distributed k-Secure Sum Protocol for Secure Multi-party Computation,\" in the Journal of Computing, USA, Vol. 2, Issue 3, pages 68--72, Mar. 2010.","journal-title":"\"A Distributed k-Secure Sum Protocol for Secure Multi-party Computation,\" in the Journal of Computing, USA"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258609"},{"key":"e_1_3_2_1_9_1","first-page":"41","volume-title":"Milwaukee WI","author":"Chor B.","year":"1995","unstructured":"B. Chor , E. Kushilevitz , O. Goldreich , and M. Sudan , \" Private Information Retrieval,\" In proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science , Milwaukee WI , pp. 41 -- 50 , Oct. 1995 . B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan, \"Private Information Retrieval,\" In proceedings of the 36th Annual IEEE Symposium on Foundations of Computer Science, Milwaukee WI, pp. 41--50, Oct. 1995."},{"key":"e_1_3_2_1_10_1","volume-title":"Privacy preserving data mining,\" in advances in cryptography-Crypto2000, lecture notes in computer science","author":"Lindell Y.","year":"2000","unstructured":"Y. Lindell and B. Pinkas , \" Privacy preserving data mining,\" in advances in cryptography-Crypto2000, lecture notes in computer science , Vol. 1880 , 2000 . Y. Lindell and B. Pinkas, \"Privacy preserving data mining,\" in advances in cryptography-Crypto2000, lecture notes in computer science, Vol. 1880, 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_2_1_12_1","first-page":"165","volume-title":"Secure Multiparty Computational Geometry,\" In proceedings of Seventh International Workshop on Algorithms and Data Structures(WADS2001)","author":"Atallah M. J.","year":"2001","unstructured":"M. J. Atallah and W. Du . \" Secure Multiparty Computational Geometry,\" In proceedings of Seventh International Workshop on Algorithms and Data Structures(WADS2001) . Providence, Rhode Island, USA , pp. 165 -- 179 , Aug. 8-10, 2001 . M. J. Atallah and W. Du. \"Secure Multiparty Computational Geometry,\" In proceedings of Seventh International Workshop on Algorithms and Data Structures(WADS2001). Providence, Rhode Island, USA, pp. 165--179, Aug. 8-10, 2001."},{"key":"e_1_3_2_1_13_1","first-page":"273","volume-title":"Nova Scotia","author":"Du W.","year":"2001","unstructured":"W. Du and M.J. Atallah . \" Privacy-Preserving Cooperative Scientific Computations,\" In 14th IEEE Computer Security Foundations Workshop , Nova Scotia , Canada , pp. 273 -- 282 , Jun. 11-13, 2001 . W. Du and M.J. Atallah. \"Privacy-Preserving Cooperative Scientific Computations,\" In 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, pp. 273--282, Jun. 11-13, 2001."},{"key":"e_1_3_2_1_14_1","first-page":"102","volume-title":"New Orleans","author":"Du W.","year":"2001","unstructured":"W. Du and M. J. Atallah , \" Privacy-Preserving Statistical Analysis,\" In proceedings of the 17th Annual Computer Security Applications Conference , New Orleans , Louisiana, USA , pp. 102 -- 110 , Dec. 10-14 2001 . W. Du and M. J. Atallah, \"Privacy-Preserving Statistical Analysis,\" In proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pp. 102--110, Dec. 10-14 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508174"},{"issue":"2","key":"e_1_3_2_1_16_1","volume":"103","author":"Oleshchuk V.","year":"2007","unstructured":"V. Oleshchuk , and V. Zadorozhny , \"Secure Multi-Party Computations and Privacy Preservation: Results and Open Problems,\" Telektronikk: Telenor's Journal of Technology , vol. 103 , No. 2 , 2007 . V. Oleshchuk, and V. Zadorozhny, \"Secure Multi-Party Computations and Privacy Preservation: Results and Open Problems,\" Telektronikk: Telenor's Journal of Technology, vol. 103, No. 2, 2007.","journal-title":"\"Secure Multi-Party Computations and Privacy Preservation: Results and Open Problems,\" Telektronikk: Telenor's Journal of Technology"},{"issue":"2","key":"e_1_3_2_1_17_1","volume":"2","author":"Mishra D. K.","year":"2007","unstructured":"D. K. Mishra , M. Chandwani , \"Extended Protocol for Secure Multiparty Computation using Ambiguous Identity,\" WSEAS Transaction on Computer Research , vol. 2 , issue 2 , Feb. 2007 . D. K. Mishra, M. Chandwani, \"Extended Protocol for Secure Multiparty Computation using Ambiguous Identity,\" WSEAS Transaction on Computer Research, vol. 2, issue 2, Feb. 2007.","journal-title":"WSEAS Transaction on Computer Research"},{"key":"e_1_3_2_1_18_1","volume-title":"ASIACRYPT","author":"Y.","year":"2014","unstructured":"Cohen, R., & Lindell, Y. ( 2014 ). Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation . In ASIACRYPT 2014. Cohen, R., & Lindell, Y. (2014). Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation. In ASIACRYPT 2014."}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:38:46Z","timestamp":1750221526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":18,"alternative-id":["10.1145\/2905055.2905316","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905316","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}