iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/NBIS.2013.24
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:19:54Z","timestamp":1729671594362,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/nbis.2013.24","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:36:49Z","timestamp":1388774209000},"page":"141-148","source":"Crossref","is-referenced-by-count":2,"title":["A Proposal of Privacy-Preserving Data Aggregation on the Cloud Computing"],"prefix":"10.1109","author":[{"given":"Mebae","family":"Ushdia","sequence":"first","affiliation":[]},{"given":"Kouichi","family":"Itoh","sequence":"additional","affiliation":[]},{"given":"Yoshinori","family":"Katayama","sequence":"additional","affiliation":[]},{"given":"Fumihiko","family":"Kozakura","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Tsuda","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1142\/S021848850200165X"},{"key":"13","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1007\/978-3-642-29011-4_35","article-title":"Adaptively attribute-hiding (hierarchical) inner product encryption","author":"okamoto","year":"2012","journal-title":"Advances in Cryptology-EUROCRYPT 2012"},{"key":"14","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1007\/978-3-642-34961-4_22","article-title":"Fully secure unbounded inner-product and attribute-based encryption","author":"okamoto","year":"2012","journal-title":"Advances in Cryptology - ASI-ACRYPT 2012"},{"key":"11","first-page":"106","article-title":"T-closeness: Privacy beyond k-anonymity and l-diversity","author":"venkatasubramanian","year":"2007","journal-title":"Data Engineering 2007"},{"key":"12","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","article-title":"Fully secure functional encryption with general relations from the decisional linear assumption","author":"okamoto","year":"2010","journal-title":"Advances in Cryptology - CRYPTO 2010"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066187"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"1","first-page":"111","article-title":"Robust de-anonymization of large sparse datasets","author":"shmatikov","year":"2008","journal-title":"Security and Privacy 2008"},{"key":"10","first-page":"24","article-title":"Fully homomorphic encryption over 7the integers","author":"halevi","year":"2011","journal-title":"Advances in Cryptology - Eurocrypt 2010"},{"key":"7","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","article-title":"Fully homomorphic encryption from ring-lwe and security for key dependent message","author":"brakerski","year":"2011","journal-title":"Advances in Cryptology - CRYPTO 2011"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"5","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","article-title":"Fully homomorphic encryption without modulus switching from classical gapsvp","author":"brakerski","year":"2012","journal-title":"Advances in Cryptology - CRYPTO 2012"},{"key":"4","article-title":"L-diversity: Privacy beyond k-anonymity","volume":"1","author":"gehrke","year":"2007","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"journal-title":"Technical Report Federal Committee on Statitical Methdorogy","article-title":"Statistical policy working paper 22 (revised 2005)-report on statistical disclosure limitation methodology","year":"2005","author":"gonzalez","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"}],"event":{"name":"2013 16th International Conference on Network-Based Information Systems (NBiS)","start":{"date-parts":[[2013,9,4]]},"location":"Seo-gu, Gwangju, CA, Korea (South)","end":{"date-parts":[[2013,9,6]]}},"container-title":["2013 16th International Conference on Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684444\/6685323\/06685389.pdf?arnumber=6685389","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T05:13:55Z","timestamp":1498108435000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6685389\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/nbis.2013.24","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}