{"id":"https://openalex.org/W2113261716","doi":"https://doi.org/10.1145/1111322.1111326","title":"Secure distributed data-mining and its application to large-scale network measurements","display_name":"Secure distributed data-mining and its application to large-scale network measurements","publication_year":2006,"publication_date":"2006-01-10","ids":{"openalex":"https://openalex.org/W2113261716","doi":"https://doi.org/10.1145/1111322.1111326","mag":"2113261716"},"language":"en","primary_location":{"id":"doi:10.1145/1111322.1111326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1111322.1111326","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016001264","display_name":"Matthew Roughan","orcid":"https://orcid.org/0000-0002-7882-7329"},"institutions":[{"id":"https://openalex.org/I5681781","display_name":"University of Adelaide","ror":"https://ror.org/00892tw58","country_code":"AU","type":"education","lineage":["https://openalex.org/I5681781"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Matthew Roughan","raw_affiliation_strings":["University of Adelaide, Australia","UNIVERSITY OF ADELAIDE, AUSTRALIA,"],"affiliations":[{"raw_affiliation_string":"University of Adelaide, Australia","institution_ids":["https://openalex.org/I5681781"]},{"raw_affiliation_string":"UNIVERSITY OF ADELAIDE, AUSTRALIA,","institution_ids":["https://openalex.org/I5681781"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100343712","display_name":"Yin Zhang\u22c6","orcid":"https://orcid.org/0000-0002-1772-0763"},"institutions":[{"id":"https://openalex.org/I86519309","display_name":"The University of Texas at Austin","ror":"https://ror.org/00hj54h04","country_code":"US","type":"education","lineage":["https://openalex.org/I86519309"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yin Zhang","raw_affiliation_strings":["University of Texas at Austin, Austin, TX"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, Austin, TX","institution_ids":["https://openalex.org/I86519309"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016001264"],"corresponding_institution_ids":["https://openalex.org/I5681781"],"apc_list":null,"apc_paid":null,"fwci":5.5888,"has_fulltext":false,"cited_by_count":48,"citation_normalized_percentile":{"value":0.95585856,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"36","issue":"1","first_page":"7","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.887283205986023},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7296072244644165},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6154319047927856},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.5304056406021118},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.48702722787857056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4749890863895416},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.43146440386772156},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4192081093788147},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3599228858947754},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.34351271390914917},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1679842472076416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.887283205986023},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7296072244644165},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6154319047927856},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.5304056406021118},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.48702722787857056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4749890863895416},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43146440386772156},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4192081093788147},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3599228858947754},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.34351271390914917},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1679842472076416},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1145/1111322.1111326","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1111322.1111326","pdf_url":null,"source":{"id":"https://openalex.org/S66039016","display_name":"ACM SIGCOMM Computer Communication Review","issn_l":"0146-4833","issn":["0146-4833","1943-5819"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM SIGCOMM Computer Communication Review","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.121.8375","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.121.8375","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utexas.edu/~yzhang/papers/mining-ccr06.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.532.8865","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.532.8865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ccr.sigcomm.org/archive/2006/january/p7-roughan.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.60.9262","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9262","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://internal.maths.adelaide.edu.au/people/mroughan/Papers/ccr_2006.pdf","raw_type":"text"},{"id":"pmh:oai:digital.library.adelaide.edu.au:2440/23799","is_oa":false,"landing_page_url":"http://hdl.handle.net/2440/23799","pdf_url":null,"source":{"id":"https://openalex.org/S4306401835","display_name":"Adelaide Research & Scholarship (AR&S) (University of Adelaide)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I5681781","host_organization_name":"The University of Adelaide","host_organization_lineage":["https://openalex.org/I5681781"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://doi.acm.org/10.1145/1111322.1111326","raw_type":"Journal article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320332162","display_name":"Centers for Disease Control and Prevention","ror":"https://ror.org/042twtr12"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1557783852","https://openalex.org/W1567397627","https://openalex.org/W1647106508","https://openalex.org/W1865797552","https://openalex.org/W1952297973","https://openalex.org/W1965972569","https://openalex.org/W1970701242","https://openalex.org/W1977141583","https://openalex.org/W2002352982","https://openalex.org/W2008117330","https://openalex.org/W2032483181","https://openalex.org/W2047370889","https://openalex.org/W2078021840","https://openalex.org/W2080234606","https://openalex.org/W2088492763","https://openalex.org/W2092422002","https://openalex.org/W2098366185","https://openalex.org/W2099086552","https://openalex.org/W2099848066","https://openalex.org/W2102481563","https://openalex.org/W2107443258","https://openalex.org/W2121511513","https://openalex.org/W2122159260","https://openalex.org/W2129976399","https://openalex.org/W2135297873","https://openalex.org/W2141420453","https://openalex.org/W2144261930","https://openalex.org/W2144936818","https://openalex.org/W2145747124","https://openalex.org/W2150191781","https://openalex.org/W2157578436","https://openalex.org/W2157740020","https://openalex.org/W2293322640","https://openalex.org/W4206137901","https://openalex.org/W4231645469","https://openalex.org/W4285719527","https://openalex.org/W6673580112"],"related_works":["https://openalex.org/W2389214306","https://openalex.org/W4235240664","https://openalex.org/W2965083567","https://openalex.org/W2757182831","https://openalex.org/W1838576100","https://openalex.org/W2095886385","https://openalex.org/W2889616422","https://openalex.org/W2089704382","https://openalex.org/W1983399550","https://openalex.org/W97075385"],"abstract_inverted_index":{"The":[0,37,106,173],"rapid":[1],"growth":[2,18],"of":[3,23,73,93,103,156,161,171,186],"the":[4,7,33,42,58,112,154,169],"Internet":[5,34,95,190],"over":[6,158],"last":[8],"decade":[9],"has":[10],"been":[11,122],"startling.":[12],"However,":[13],"efforts":[14],"to":[15,47,77,181],"track":[16],"its":[17],"have":[19,121],"often":[20],"fallen":[21],"afoul":[22],"bad":[24],"data":[25,43,59,68,104,119,140,147],"---":[26],"for":[27,135],"instance,":[28],"how":[29],"much":[30],"traffic":[31,157,170],"does":[32,52],"now":[35],"carry?":[36],"problem":[38],"is":[39,44,60,98,175],"not":[40,53,61,128],"that":[41,50,57],"technically":[45],"hard":[46],"obtain,":[48],"or":[49,87,118],"it":[51,83],"exist,":[54],"but":[55],"rather":[56],"shared.":[62],"Obtaining":[63],"an":[64],"overall":[65],"picture":[66],"requires":[67],"from":[69],"multiple":[70],"sources,":[71],"few":[72],"whom":[74],"are":[75,127],"open":[76],"sharing":[78],"such":[79],"data,":[80],"either":[81],"because":[82],"violates":[84],"privacy":[85],"legislation,":[86],"exposes":[88],"business":[89],"secrets.":[90],"Likewise,":[91],"detection":[92],"global":[94],"health":[96],"problems":[97],"hampered":[99],"by":[100],"a":[101,133,159,183],"lack":[102],"sharing.":[105],"approaches":[107],"used":[108],"so":[109],"far":[110],"in":[111],"Internet,":[113],"e.g.":[114],"trusted":[115],"third":[116],"parties,":[117],"anonymization,":[120],"only":[123],"partially":[124],"successful,":[125],"and":[126,178],"widely":[129],"adopted.The":[130],"paper":[131],"presents":[132],"method":[134,174],"performing":[136],"computations":[137],"on":[138,189],"shared":[139],"without":[141,164],"any":[142,165],"participants":[143],"revealing":[144],"their":[145],"secret":[146],".":[148],"For":[149],"example,":[150],"one":[151],"can":[152],"compute":[153],"sum":[155],"set":[160],"service":[162,166],"providers":[163],"provider":[167],"learning":[168],"another.":[172],"simple,":[176],"scalable,":[177],"flexible":[179],"enough":[180],"perform":[182],"wide":[184],"range":[185],"valuable":[187],"operations":[188],"data.":[191]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
