{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:46:32Z","timestamp":1742913992610,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540004202"},{"type":"electronic","value":"9783540364139"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36413-7_15","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T15:44:57Z","timestamp":1184600697000},"page":"199-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Medical Information Privacy Assurance: Cryptographic and System Aspects"],"prefix":"10.1007","author":[{"given":"Giuseppe","family":"Ateniese","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Reza","family":"Curtmola","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Breno","family":"de Medeiros","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Darren","family":"Davis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2003,3,14]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.2307\/1321160","volume":"4","author":"S. D. Warren","year":"1890","unstructured":"S. D. Warren and L. D. Brandeis. The right to privacy. Harvard Law Rev. 4, pages 193\u2013220, 1890.","journal-title":"Harvard Law Rev"},{"key":"15_CR2","volume-title":"Privacy and Freedom","author":"A. F. Westin","year":"1967","unstructured":"A. F. Westin. Privacy and Freedom. Atheneum, New York, 1967."},{"key":"15_CR3","unstructured":"D. F. Linowes and R. C. Spencer. How employers handle employees\u2019 personal information. http:\/\/www.kentlaw.edu\/ilw\/erepj\/v1n1\/lino-main.htm, 1997."},{"key":"15_CR4","unstructured":"S. Lehrman. Keeping your genes private. GeneLetter."},{"key":"15_CR5","unstructured":"N. Keene, W. Hobbie, and K. Ruccione. Childhood cancer survivors. http:\/\/www.patientcenters.com\/survivors\/news\/jobs.html, OncoNurse.com."},{"key":"15_CR6","unstructured":"C. Jabs. The myth of privacy: Technology is putting your medical history on public view-and you in jeopardy. FamilyPC, 2001."},{"key":"15_CR7","unstructured":"R. J. Anderson. A security policy model for clinical information systems. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"D. Clark and D. Wilson A comparison of commercial and military security practices. In Proceedings of the IEEE Symposium in Security and Privacy, IEEE Press, 1987.","DOI":"10.1109\/SP.1987.10001"},{"key":"15_CR9","unstructured":"T. Albert. Doctors ask AMA to assure some privacy for their prescription pads. http:\/\/www.ama-assn.org\/sci-pubs\/amnews\/pick_00\/prl11225.htm, American Medical News. 2000."},{"key":"15_CR10","unstructured":"Ohio State Board of Pharmacy. Confidentiality of patient records. http:\/\/www.state.oh.us\/pharmacy\/rules\/4729-05-29.html. 1999."},{"key":"15_CR11","unstructured":"T. Albert. Records privacy extended to pharmacies. http:\/\/www.ama-assn.org\/sci-pubs\/amnews\/pick_01\/prsb0402.htm, American Medical News. 2001."},{"key":"15_CR12","unstructured":"WebMD Health. My Health Record, http:\/\/my.webmd.com\/my_health_record."},{"key":"15_CR13","unstructured":"Office for Civil Rights. Standards for privacy of individually identifiable health information. http:\/\/www.hhs.gov\/ocr\/hipaa\/finalmaster.html. 2001."},{"key":"15_CR14","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology-EUROCRYPT\u201991","author":"D. Chaum","year":"1991","unstructured":"D. Chaum and E. van Heyst. Group signatures. In Advances in Cryptology-EUROCRYPT\u201991, vol. 547 of LNCS, pp. 257\u2013265, Springer-Verlag, 1991."},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"D. Chaum, Security Without Identification: Transactions Systems to Make Big Brother Obsolete, CACM Vol. 28, No. 10, October 1985.","DOI":"10.1145\/4372.4373"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"D. Chaum and J. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology-CRYPTO\u201986, pp. 118\u2013167. Springer-Verlag, 1986.","DOI":"10.1007\/3-540-47721-7_10"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"I. Damg\u00e5ard. Payment systems and credential mechanisms with provable security against abuse by individuals. In Advances in Cryptology-CRYPTO\u201988, pp. 328\u2013335, Springer-Verlag, 1988.","DOI":"10.1007\/0-387-34799-2_26"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"L. Chen. Access with pseudonyms. In Cryptography: Policy and Algorithms, pp. 232\u2013243. Springer-Verlag, 1995.","DOI":"10.1007\/BFb0032362"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym Systems. In Selected Areas in Cryptography. Springer-Verlag 1999.","DOI":"10.1007\/3-540-46513-8_14"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Jan Camenisch and Anna Lysyanskaya. Efficient Non-transferable Anonymous Multi-show Credential System with Optional Anonymity Revocation. In Eurocrypt\u2019 01. Springer Verlag, 2001.","DOI":"10.1007\/3-540-44987-6_7"},{"key":"15_CR21","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"In Advances in Cryptology-CRYPTO 2000","author":"G. Ateniese","year":"2000","unstructured":"G. Ateniese, M. Joye, J. Camenisch, and G. Tsudik. A Practical and Provably Secure Coalition-resistant Group Signature Scheme. In In Advances in Cryptology-CRYPTO 2000. Volume 1880 of LNCS, pages 255\u2013270, Springer Verlag, August 2000."},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"G. Ateniese and B. de Medeiros. Anonymous E-Prescription. In ACM Workshop on Privacy in the Electronic Society (WPES\u2019 02),Washington D.C., USA, November 2002.","DOI":"10.1145\/644527.644530"}],"container-title":["Lecture Notes in Computer Science","Security in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36413-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T05:07:25Z","timestamp":1609909645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36413-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540004202","9783540364139"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/3-540-36413-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]},"assertion":[{"value":"14 March 2003","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}