{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:14:23Z","timestamp":1725488063512},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540006466"},{"type":"electronic","value":"9783540365044"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36504-4_11","type":"book-chapter","created":{"date-parts":[[2007,7,20]],"date-time":"2007-07-20T18:48:45Z","timestamp":1184957325000},"page":"147-151","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Tradeoffs: Myth or Reality?"],"prefix":"10.1007","author":[{"given":"Rebecca N.","family":"Wright","sequence":"first","affiliation":[]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[]},{"given":"Ronald L.","family":"Rivest","sequence":"additional","affiliation":[]},{"given":"Graham","family":"Wood","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"L. F. Cranor and R. Wenning, \u201cWhy P3P is a Good Privacy Tool for Businesses and Consumers\u201d, Gigalaw.com, \n                  http:\/\/www.gigalaw.com\/articles\/2002\/cranor-2002-04.html\n                  \n                , 2002."},{"key":"11_CR2","unstructured":"P. Jacobus, \u201cGookies\u201d targeted as Congress, advocates address Net privacy\u201d, CNET News.com, February 11, 2000."},{"issue":"1","key":"11_CR3","first-page":"62","volume":"282","author":"A. Reeder","year":"1998","unstructured":"A. Reeder, \u201cTo See and Be Seen\u201d, The Atlantic Monthly, Vol. 282, No. 1, p. 62, July 1998.","journal-title":"The Atlantic Monthly"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36504-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T17:57:33Z","timestamp":1578506253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36504-4_11"}},"subtitle":["Panel Summary"],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540006466","9783540365044"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-36504-4_11","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}