{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:48:16Z","timestamp":1725612496120},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000893","name":"Simons Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000893","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["DP130101801"],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2019,11,1]]},"DOI":"10.1109\/tkde.2018.2874004","type":"journal-article","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T19:38:18Z","timestamp":1538681898000},"page":"2164-2177","source":"Crossref","is-referenced-by-count":26,"title":["Precise and Fast Cryptanalysis for Bloom Filter Based Privacy-Preserving Record Linkage"],"prefix":"10.1109","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3435-2015","authenticated-orcid":false,"given":"Peter","family":"Christen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5405-3704","authenticated-orcid":false,"given":"Thilina","family":"Ranbaduge","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6713-7667","authenticated-orcid":false,"given":"Dinusha","family":"Vatsalan","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7843-4974","authenticated-orcid":false,"given":"Rainer","family":"Schnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.12.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-9-41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.12.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2761759"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57454-7_49"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27707-3_21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22263-4_13"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-000917"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i2.640"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.91"},{"key":"ref28","author":"manning","year":"1999","journal-title":"Foundations of Statistical Natural Language Processing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15838-4_24"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199695591.001.0001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781119072454.ch9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49340-4_25"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2012.11.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v1i1.566"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113352"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23633-9_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.23889\/ijpds.v1i1.101"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31164-2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/11841036_42"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2661829.2661875"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref24","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.3527984","article-title":"XOR-folding for Bloom filter-based encryptions for privacy-preserving record linkage","author":"schnell","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0038"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06608-0_40"},{"key":"ref25","author":"mitchell","year":"1997","journal-title":"Machine Learning"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8861188\/08481521.pdf?arnumber=8481521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:14:11Z","timestamp":1657746851000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8481521\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,1]]},"references-count":28,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2018.2874004","relation":{},"ISSN":["1041-4347","1558-2191","2326-3865"],"issn-type":[{"value":"1041-4347","type":"print"},{"value":"1558-2191","type":"electronic"},{"value":"2326-3865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,1]]}}}