{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:58Z","timestamp":1725566158515},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540237211"},{"type":"electronic","value":"9783540304739"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30473-9_6","type":"book-chapter","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T20:42:12Z","timestamp":1285274532000},"page":"61-71","source":"Crossref","is-referenced-by-count":3,"title":["Privacy Protection in Memory-Based Collaborative Filtering"],"prefix":"10.1007","author":[{"given":"Wim F. J.","family":"Verhaegh","sequence":"first","affiliation":[]},{"given":"Aukje E. M.","family":"van Duijnhoven","sequence":"additional","affiliation":[]},{"given":"Pim","family":"Tuyls","sequence":"additional","affiliation":[]},{"given":"Jan","family":"Korst","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Wolf, J., Wu, K.-L., Yu, P.: Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In: Proceedings ACMKDD 1999 Conference, pp. 201\u2013212 (1999)","DOI":"10.1145\/312129.312230"},{"key":"6_CR2","unstructured":"Breese, J., Heckerman, D., Kadie, C.: Empirical analysis of predictive algorithms for collaborative filtering. In: Proceedings 14th Conference on Uncertainty in Artificial Intelligence, pp. 43\u201352 (1998)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy. In: Proceedings IEEE Symposium on Security and Privacy, pp. 45\u201357 (2002)","DOI":"10.1109\/SECPRI.2002.1004361"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Canny, J.: Collaborative filtering with privacy via factor analysis. In: Proceedings ACM SIGIR, pp. 238\u2013245 (2002)","DOI":"10.1145\/564376.564419"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1037\/h0026256","volume":"70","author":"J. Cohen","year":"1968","unstructured":"Cohen, J.: Weighted kappa: Nominal scale agreement with provision for scaled disagreement or partial credit. Psychological Bulletin\u00a070, 213\u2013220 (1968)","journal-title":"Psychological Bulletin"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-36504-4_10","volume-title":"Financial Cryptography","author":"P.-A. Fouque","year":"2003","unstructured":"Fouque, P.-A., Stern, J., Wackers, J.-G.: Cryptocomputing with rationals. In: Blaze, M. (ed.) FC 2002. LNCS, vol.\u00a02357, pp. 136\u2013146. Springer, Heidelberg (2003)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Herlocker, J., Konstan, J., Borchers, A., Riedl, J.: An algorithmic framework for performing collaborative filtering. In: Proceedings ACM SIGIR 1999, pp. 230\u2013237 (1999)","DOI":"10.1145\/312624.312682"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Karypis, G.: Evaluation of item-based top-n recommendation algorithms. In: Proceedings 10th Conference on Information and Knowledge Management, pp. 247\u2013254 (2001)","DOI":"10.1145\/502585.502627"},{"key":"6_CR9","unstructured":"Nakamura, A., Abe, N.: Collaborative filtering using weighted majority prediction algorithms. In: Proceedings 15th International Conference on Machine Learning, pp. 395\u2013403 (1998)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","first-page":"223","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Analysis of recommendation algorithms for e-commerce. In: Proceedings 2nd ACM Conference on Electronic Commerce, pp. 158\u2013167 (2000)","DOI":"10.1145\/352871.352887"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings 10th World Wide Web Conference (WWW10), pp. 285\u2013295 (2001)","DOI":"10.1145\/371920.372071"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Shardanand, U., Maes, P.: Social information filtering: Algorithms for automating word of mouth. In: Proceedings CHI 1995, pp. 210\u2013217 (1995)","DOI":"10.1145\/223904.223931"},{"key":"6_CR14","unstructured":"van Duijnhoven, A.E.M.: Collaborative filtering with privacy. Master\u2019s thesis, Technische Universiteit Eindhoven (2003)"}],"container-title":["Lecture Notes in Computer Science","Ambient Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30473-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T03:41:08Z","timestamp":1553139668000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30473-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540237211","9783540304739"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30473-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}