{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T19:10:01Z","timestamp":1763233801561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,27]],"date-time":"2017-08-27T00:00:00Z","timestamp":1503792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,27]]},"DOI":"10.1145\/3109859.3109881","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T11:58:11Z","timestamp":1503575891000},"page":"89-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Secure Multi-Party Protocols for Item-Based Collaborative Filtering"],"prefix":"10.1145","author":[{"given":"Erez","family":"Shmueli","sequence":"first","affiliation":[{"name":"Tel-Aviv University, Tel-Aviv, Israel"}]},{"given":"Tamir","family":"Tassa","sequence":"additional","affiliation":[{"name":"The Open University, Ra'anana, Israel"}]}],"member":"320","published-online":{"date-parts":[[2017,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052602"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Anirban Basu Jaideep Vaidya and Hiroaki Kikuchi. 2012. Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering. In IFIPTM. 17--35. Anirban Basu Jaideep Vaidya and Hiroaki Kikuchi. 2012. Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering. In IFIPTM. 17--35.","DOI":"10.1007\/978-3-642-29852-3_2"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Iv\u00e1n Cantador Ignacio Fern\u00e1ndez-Tob\u00edas Shlomo Berkovsky and Paolo Cremonesi. 2015. Cross-domain recommender systems. In Recommender Systems Handbook. 919--959. Iv\u00e1n Cantador Ignacio Fern\u00e1ndez-Tob\u00edas Shlomo Berkovsky and Paolo Cremonesi. 2015. Cross-domain recommender systems. In Recommender Systems Handbook. 919--959.","DOI":"10.1007\/978-1-4899-7637-6_27"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2013.37"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844125"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000009"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Arik Friedman Bart P Knijnenburg Kris Vanhecke Luc Martens and Shlomo Berkovsky. 2015. Privacy aspects of recommender systems. In Recommender Systems Handbook. 649--688. Arik Friedman Bart P Knijnenburg Kris Vanhecke Luc Martens and Shlomo Berkovsky. 2015. Privacy aspects of recommender systems. In Recommender Systems Handbook. 649--688.","DOI":"10.1007\/978-1-4899-7637-6_19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/138859.138867"},{"key":"e_1_3_2_1_9_1","unstructured":"Tal Grinshpoun and Tamir Tassa. 2014. A privacy-preserving algorithm for distributed constraint optimization. In AAMAS. 909--916. Tal Grinshpoun and Tamir Tassa. 2014. A privacy-preserving algorithm for distributed constraint optimization. In AAMAS. 909--916."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3176748.3176762"},{"volume-title":"International Conference on Collaboration Technologies and Systems. 439--446","author":"Jeckmans Arjan","key":"e_1_3_2_1_11_1","unstructured":"Arjan Jeckmans , Qiang Tang , and Pieter H. Hartel . 2012. Privacy-preserving collaborative filtering based on horizontally partitioned dataset . In International Conference on Collaboration Technologies and Systems. 439--446 . Arjan Jeckmans, Qiang Tang, and Pieter H. Hartel. 2012. Privacy-preserving collaborative filtering based on horizontally partitioned dataset. In International Conference on Collaboration Technologies and Systems. 439--446."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0008-z"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2566972.2566989"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Daniel Lemire and Anna Maclachlan. 2005. Slope One Predictors for Online Rating-Based Collaborative Filtering. In SDM. 471--475. Daniel Lemire and Anna Maclachlan. 2005. Slope One Predictors for Online Rating-Based Collaborative Filtering. In SDM. 471--475.","DOI":"10.1137\/1.9781611972757.43"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.30"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Eurocrypt. 223--238. Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Eurocrypt. 223--238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Huseyin Polat andWenliang Du. 2005. Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. In PKDD. 651--658. Huseyin Polat andWenliang Du. 2005. Privacy-Preserving Collaborative Filtering on Vertically Partitioned Data. In PKDD. 651--658.","DOI":"10.1007\/11564126_69"},{"key":"e_1_3_2_1_20_1","first-page":"1093","article-title":"Privacy-preserving top-N recommendation on distributed data","volume":"59","author":"Polat Huseyin","year":"2008","unstructured":"Huseyin Polat and Wenliang Du . 2008 . Privacy-preserving top-N recommendation on distributed data . Journal of the Association for Information Science and Technology 59 (2008), 1093 -- 1108 . Huseyin Polat and Wenliang Du. 2008. Privacy-preserving top-N recommendation on distributed data. Journal of the Association for Information Science and Technology 59 (2008), 1093--1108.","journal-title":"Journal of the Association for Information Science and Technology"},{"key":"e_1_3_2_1_21_1","volume-title":"BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461.","author":"Rendle Steffen","year":"2009","unstructured":"Steffen Rendle , Christoph Freudenthaler , Zeno Gantner , and Lars Schmidt-Thieme . 2009 . BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461. Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme. 2009. BPR: Bayesian personalized ranking from implicit feedback. In UAI. 452--461."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337035"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Assaf Schuster RanWolfe and Bobi Gilburd. 2004. Privacy-preserving association rule mining in large-scale distributed systems. In CCGRID. 411--418. Assaf Schuster RanWolfe and Bobi Gilburd. 2004. Privacy-preserving association rule mining in large-scale distributed systems. In CCGRID. 411--418.","DOI":"10.1109\/CCGrid.2004.1336595"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.41"},{"key":"e_1_3_2_1_26_1","unstructured":"Tamir Tassa and Francesco Bonchi. 2014. Privacy Preserving Estimation of Social Influence. In EDBT. 559--570. Tamir Tassa and Francesco Bonchi. 2014. Privacy Preserving Estimation of Social Influence. In EDBT. 559--570."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.232"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188349.2188353"},{"key":"e_1_3_2_1_29_1","unstructured":"Tamir Tassa Roie Zivan and Tal Grinshpoun. 2015. Max-Sum Goes Private. In IJCAI. 425--431. Tamir Tassa Roie Zivan and Tal Grinshpoun. 2015. Max-Sum Goes Private. In IJCAI. 425--431."},{"key":"e_1_3_2_1_30_1","unstructured":"Tamir Tassa Roie Zivan and Tal Grinshpoun. 2016. Preserving Privacy in Region Optimal DCOP Algorithms. In IJCAI. 496--502. Tamir Tassa Roie Zivan and Tal Grinshpoun. 2016. Preserving Privacy in Region Optimal DCOP Algorithms. In IJCAI. 496--502."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2009.2016430"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.11.002"},{"key":"e_1_3_2_1_34_1","unstructured":"Andrew C. Yao. 1982. Protocols for secure computation. In FOCS. 160--164. Andrew C. Yao. 1982. Protocols for secure computation. In FOCS. 160--164."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065185"}],"event":{"name":"RecSys '17: Eleventh ACM Conference on Recommender Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGIR ACM Special Interest Group on Information Retrieval","SIGecom Special Interest Group on Economics and Computation"],"location":"Como Italy","acronym":"RecSys '17"},"container-title":["Proceedings of the Eleventh ACM Conference on Recommender Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109859.3109881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3109859.3109881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T01:39:32Z","timestamp":1750815572000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3109859.3109881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,27]]},"references-count":35,"alternative-id":["10.1145\/3109859.3109881","10.1145\/3109859"],"URL":"https:\/\/doi.org\/10.1145\/3109859.3109881","relation":{},"subject":[],"published":{"date-parts":[[2017,8,27]]},"assertion":[{"value":"2017-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}