{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:58Z","timestamp":1738819558358,"version":"3.37.0"},"reference-count":14,"publisher":"Academy Publisher","issue":"10","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.10.2655-2664","type":"journal-article","created":{"date-parts":[[2014,10,6]],"date-time":"2014-10-06T14:03:16Z","timestamp":1412604196000},"source":"Crossref","is-referenced-by-count":5,"title":["Collaborative Outsourced Data Mining for Secure Cloud Computing"],"prefix":"10.4304","volume":"9","author":[{"given":"Yila","family":"Huang","sequence":"first","affiliation":[]},{"given":"Qiwei","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,10,6]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687758"},{"key":"ref2","first-page":"313","volume-title":"A survey of privacy-preserving methods across horizontally partitioned data","author":"Kantarcioglu","year":"2008","unstructured":"[5] M. Kantarcioglu, \"A survey of privacy-preserving methods across horizontally partitioned data,\" Privacy-Preserving Data Mining, pp. 313\u2013335, 2008."},{"key":"ref3","first-page":"359","volume-title":"A survey of attack techniques on privacy-preserving data perturbation methods","author":"Liu","year":"2008","unstructured":"[6] K. Liu, C. Giannella, and H. Kargupta, \"A survey of attack techniques on privacy-preserving data perturbation methods,\" Privacy-Preserving Data Mining, pp. 359\u2013381, 2008."},{"key":"ref4","first-page":"337","volume-title":"A survey of privacy-preserving methods across vertically partitioned data","author":"Vaidya","year":"2008","unstructured":"[7] J. Vaidya, \"A survey of privacy-preserving methods across vertically partitioned data,\" Privacy-Preserving Data Mining, pp. 337\u2013358, 2008."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-70992-5"},{"key":"ref6","first-page":"90","volume-title":"A privacy manager for cloud computing","author":"Pearson","year":"2009","unstructured":"[12] S. Pearson, Y. Shen, and M. Mowbray, \"A privacy manager for cloud computing,\" Cloud Computing, pp. 90\u2013106, 2009."},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.19"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref9","first-page":"433","article-title":"Passwordprotected secret sharing","volume-title":"ACM Conference on Computer and Communications Security","author":"Bagherzandi","year":"2011","unstructured":"[24] A. Bagherzandi, S. Jarecki, N. Saxena, and Y. Lu, \"Passwordprotected secret sharing,\" in ACM Conference on Computer and Communications Security, 2011, pp. 433\u2013444."},{"key":"ref10","first-page":"677","article-title":"Practical pir for electronic commerce","volume-title":"ACM Conference on Computer and Communications Security","author":"Henry","year":"2011","unstructured":"[25] R. Henry, F. G. Olumofin, and I. Goldberg, \"Practical pir for electronic commerce,\" in ACM Conference on Computer and Communications Security, 2011, pp. 677\u2013690."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref13","first-page":"354","volume-title":"\"Robust threshold dss signatures \" in Advances in Cryptology\u0142EUROCRYPT96","author":"Gennaro","year":"1996","unstructured":"[28] R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, \"Robust threshold dss signatures,\" in Advances in Cryptology\u0142EUROCRYPT96. Springer, 1996, pp. 354\u2013371."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.70"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:09Z","timestamp":1738775289000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,6]]},"references-count":14,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2014,10,6]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.10.2655-2664","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,10,6]]}}}