{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:44:53Z","timestamp":1758267893581,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,31]],"date-time":"2017-01-31T00:00:00Z","timestamp":1485820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1,31]]},"DOI":"10.1145\/3014812.3014886","type":"proceedings-article","created":{"date-parts":[[2016,12,20]],"date-time":"2016-12-20T13:25:34Z","timestamp":1482240334000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Privacy preserving in big data sets through multiple shuffle"],"prefix":"10.1145","author":[{"given":"Youyang","family":"Qu","sequence":"first","affiliation":[{"name":"Deakin University, Victoria, Australia"}]},{"given":"Jiyang","family":"Xu","sequence":"additional","affiliation":[{"name":"Deakin University, Victoria, Australia"}]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[{"name":"Deakin University, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2017,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1149","article-title":"Information security in big data: Privacy and data mining","volume":"2","author":"Xu J. Wang J.","year":"2015","unstructured":"J. Wang J. Yuan L. Xu , C. Jiang and Y. Ren . Information security in big data: Privacy and data mining . IEEE Access , 2 : 1149 -- 1176 , 2015 . J. Wang J. Yuan L. Xu, C. Jiang and Y. Ren. Information security in big data: Privacy and data mining. IEEE Access, 2:1149--1176, 2015.","journal-title":"IEEE Access"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"Proceedings of the IEEE Symposium on Research in Security and Privacy","author":"Samarati P.","year":"1998","unstructured":"P. Samarati and L. Sweeney . Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression . In Proceedings of the IEEE Symposium on Research in Security and Privacy , pages 1 -- 19 , 1998 . P. Samarati and L. Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 1--19, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.139"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2368363"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/498255a"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1197872"},{"key":"e_1_3_2_1_11_1","volume-title":"Gartner Report","author":"Laney D.","year":"2011","unstructured":"D. Laney . 3d data management : Controlling data volume, velocity and variety . In Gartner Report , 2011 . D. Laney. 3d data management: Controlling data volume, velocity and variety. In Gartner Report, 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113353"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509013.2509016"},{"key":"e_1_3_2_1_14_1","volume-title":"Elements of Information Theory","author":"Cover T.M.","year":"2006","unstructured":"T.M. Cover and J.A. Thomas . Elements of Information Theory . Wiley & Sons , 2006 . T.M. Cover and J.A. Thomas. Elements of Information Theory. Wiley & Sons, 2006."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INISTA.2014.6873601"},{"key":"e_1_3_2_1_16_1","volume-title":"Dictionary of algorithms and data structures","author":"Black PE","year":"2005","unstructured":"PE Black . Dictionary of algorithms and data structures . 2005 . PE Black. Dictionary of algorithms and data structures. 2005."}],"event":{"name":"ACSW 2017: Australasian Computer Science Week 2017","acronym":"ACSW 2017","location":"Geelong Australia"},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014886","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3014812.3014886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:18Z","timestamp":1750220658000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3014812.3014886"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,31]]},"references-count":16,"alternative-id":["10.1145\/3014812.3014886","10.1145\/3014812"],"URL":"https:\/\/doi.org\/10.1145\/3014812.3014886","relation":{},"subject":[],"published":{"date-parts":[[2017,1,31]]},"assertion":[{"value":"2017-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}