{"id":"https://openalex.org/W2791465584","doi":"https://doi.org/10.1093/comjnl/bxy024","title":"An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining","display_name":"An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining","publication_year":2018,"publication_date":"2018-02-22","ids":{"openalex":"https://openalex.org/W2791465584","doi":"https://doi.org/10.1093/comjnl/bxy024","mag":"2791465584"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy024","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy024","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100324876","display_name":"Rong Wang","orcid":"https://orcid.org/0000-0001-9251-3775"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rong Wang","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100434314","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0002-5804-8926"},"institutions":[{"id":"https://openalex.org/I4800084","display_name":"Southwest Jiaotong University","ror":"https://ror.org/00hn7w693","country_code":"CN","type":"education","lineage":["https://openalex.org/I4800084"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China","institution_ids":["https://openalex.org/I4800084"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070790321","display_name":"Tung-Shou Chen","orcid":"https://orcid.org/0000-0002-5307-1043"},"institutions":[{"id":"https://openalex.org/I131948415","display_name":"National Taichung University of Science and Technology","ror":"https://ror.org/05bgcav40","country_code":"TW","type":"education","lineage":["https://openalex.org/I131948415"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Tung-Shou Chen","raw_affiliation_strings":["Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan","institution_ids":["https://openalex.org/I131948415"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038550838","display_name":"Chin\u2010Chen Chang","orcid":"https://orcid.org/0000-0002-7319-5780"},"institutions":[{"id":"https://openalex.org/I4880106","display_name":"Feng Chia University","ror":"https://ror.org/05vhczg54","country_code":"TW","type":"education","lineage":["https://openalex.org/I4880106"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chin-Chen Chang","raw_affiliation_strings":["Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung, Taiwan","institution_ids":["https://openalex.org/I4880106"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100434314"],"corresponding_institution_ids":["https://openalex.org/I4800084"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.65488005,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"61","issue":"8","first_page":"1123","last_page":"1132"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10828","display_name":"Biometric Identification and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.814857542514801},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.6510710716247559},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5223459005355835},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4812297821044922},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.42747631669044495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4142586290836334},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3345261812210083},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.23404040932655334}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.814857542514801},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.6510710716247559},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5223459005355835},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4812297821044922},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.42747631669044495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4142586290836334},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3345261812210083},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.23404040932655334},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy024","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy024","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1548445892","https://openalex.org/W1570448133","https://openalex.org/W2001336960","https://openalex.org/W2029712629","https://openalex.org/W2035439597","https://openalex.org/W2041025307","https://openalex.org/W2056340285","https://openalex.org/W2112098765","https://openalex.org/W2127414816","https://openalex.org/W2128906841","https://openalex.org/W2135459805","https://openalex.org/W2140190241","https://openalex.org/W2159024459","https://openalex.org/W2255171392","https://openalex.org/W2286401905","https://openalex.org/W2769353087"],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W200604156","https://openalex.org/W2374784346","https://openalex.org/W2382515644","https://openalex.org/W1930396972","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Outsourcing":[0],"data":[1,7,14,25,87,90,94,112,121,131,137,158,181],"mining":[2,15,95],"tasks":[3],"is":[4,36,47,103,133,153],"beneficial":[5],"for":[6],"owners":[8],"who":[9],"either":[10],"lack":[11],"expertise":[12],"in":[13,59,67,73,155,187],"or":[16],"sufficient":[17],"computing":[18],"resources.":[19],"However,":[20,63],"directly":[21],"releasing":[22],"the":[23,42,50,57,60,68,71,80,107,116,119,156,161,166,174,178,189],"original":[24,61,120],"would":[26],"leak":[27],"private":[28],"information.":[29],"Research":[30],"on":[31],"Privacy-Preserving":[32],"Data":[33],"Mining":[34],"(PPDM)":[35],"dedicated":[37],"to":[38,48,78,88,105,114,123,144,159],"addressing":[39],"this":[40,45,98],"issue,":[41],"aim":[43],"of":[44,52,84,111,118,130,165,180],"research":[46],"reduce":[49],"risk":[51],"privacy":[53,117],"violations":[54],"and":[55,82,122,163,183],"preserve":[56],"knowledge":[58],"data.":[62,168],"most":[64],"existing":[65],"methods":[66,186],"literature":[69],"ignore":[70],"case":[72],"which":[74],"service":[75],"providers":[76],"want":[77],"verify":[79,160],"integrity":[81,162],"authenticity":[83,164],"their":[85,140],"clients\u2019":[86],"avoid":[89],"tampering":[91],"before":[92],"performing":[93],"tasks.":[96],"In":[97],"paper,":[99],"a":[100,145,149],"new":[101],"method":[102,176],"proposed":[104,175],"extend":[106],"turtle":[108],"shell":[109],"algorithm":[110],"hiding":[113],"protect":[115],"acquire":[124],"authentication":[125,151],"functions":[126],"simultaneously.":[127],"The":[128,169],"act":[129],"perturbation":[132,182],"performed":[134],"by":[135],"replacing":[136],"values":[138],"with":[139],"closest":[141],"neighbors":[142],"according":[143],"reference":[146],"matrix.":[147],"Further,":[148],"message":[150],"code":[152],"hidden":[154],"perturbed":[157,167],"experimental":[170],"results":[171],"showed":[172],"that":[173],"achieved":[177],"purpose":[179],"outperformed":[184],"similar":[185],"satisfying":[188],"PPDM":[190],"requirement.":[191]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
