{"_id":"Hvo3YzFhEmJuFSdnq","bibbaseid":"bogdanov-niitsoo-toft-willemson-highperformancesecuremultipartycomputationfordataminingapplications-2012","author_short":["Bogdanov, D.","Niitsoo, M.","Toft, T.","Willemson, J."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Dan"],"propositions":[],"lastnames":["Bogdanov"],"suffixes":[]},{"firstnames":["Margus"],"propositions":[],"lastnames":["Niitsoo"],"suffixes":[]},{"firstnames":["Tomas"],"propositions":[],"lastnames":["Toft"],"suffixes":[]},{"firstnames":["Jan"],"propositions":[],"lastnames":["Willemson"],"suffixes":[]}],"title":"High-performance secure multi-party computation for data mining applications","journal":"International Journal of Information Security","volume":"11","number":"6","pages":"403–418","month":"November","year":"2012","coden":"????","doi":"https://doi.org/10.1007/s10207-012-0177-2","issn":"1615-5262 (print), 1615-5270 (electronic)","issn-l":"1615-5262","bibdate":"Tue Jan 23 16:01:38 MST 2018","bibsource":"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib","url":"http://link.springer.com/article/10.1007/s10207-012-0177-2","acknowledgement":"Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \\path|beebe@math.utah.edu|, \\path|beebe@acm.org|, \\path|beebe@computer.org| (Internet), URL: \\path|https://www.math.utah.edu/ beebe/|","fjournal":"International Journal of Information Security","journal-url":"https://link.springer.com/journal/10207","bibtex":"@Article{Bogdanov:2012:HPS,\n author = \"Dan Bogdanov and Margus Niitsoo and Tomas Toft and Jan\n Willemson\",\n title = \"High-performance secure multi-party computation for\n data mining applications\",\n journal = j-INT-J-INFO-SEC,\n volume = \"11\",\n number = \"6\",\n pages = \"403--418\",\n month = nov,\n year = \"2012\",\n CODEN = \"????\",\n DOI = \"https://doi.org/10.1007/s10207-012-0177-2\",\n ISSN = \"1615-5262 (print), 1615-5270 (electronic)\",\n ISSN-L = \"1615-5262\",\n bibdate = \"Tue Jan 23 16:01:38 MST 2018\",\n bibsource = \"https://www.math.utah.edu/pub/tex/bib/intjinfosec.bib\",\n URL = \"http://link.springer.com/article/10.1007/s10207-012-0177-2\",\n acknowledgement = ack-nhfb,\n fjournal = \"International Journal of Information Security\",\n journal-URL = \"https://link.springer.com/journal/10207\",\n}\n\n","author_short":["Bogdanov, D.","Niitsoo, M.","Toft, T.","Willemson, J."],"key":"Bogdanov:2012:HPS","id":"Bogdanov:2012:HPS","bibbaseid":"bogdanov-niitsoo-toft-willemson-highperformancesecuremultipartycomputationfordataminingapplications-2012","role":"author","urls":{"Paper":"http://link.springer.com/article/10.1007/s10207-012-0177-2"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"ftp.math.utah.edu/pub/tex/bib/intjinfosec.bib","dataSources":["fEXH7XH8oyBtpzKFi"],"keywords":[],"search_terms":["high","performance","secure","multi","party","computation","data","mining","applications","bogdanov","niitsoo","toft","willemson"],"title":"High-performance secure multi-party computation for data mining applications","year":2012}