{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:06:13Z","timestamp":1758845173884},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403814"},{"type":"electronic","value":"9783540449638"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44963-9_23","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T19:07:02Z","timestamp":1184612822000},"page":"168-177","source":"Crossref","is-referenced-by-count":11,"title":["Privacy Preservation Improvement by Learning Optimal Profile Generation Rate"],"prefix":"10.1007","author":[{"given":"Tsvi","family":"Kuflik","sequence":"first","affiliation":[]},{"given":"Bracha","family":"Shapira","sequence":"additional","affiliation":[]},{"given":"Yuval","family":"Elovici","sequence":"additional","affiliation":[]},{"given":"Adlai","family":"Maschiach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,18]]},"reference":[{"issue":"3","key":"23_CR1","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/245108.245124","volume":"40","author":"M. Balabanovic","year":"1997","unstructured":"Balabanovic\u2019, M., and Shoham, Y. Fab: Content-Based, Collaborative Recommendation. Communications of the ACM 40(3), (1997) pp. 66\u201372.","journal-title":"Communications of the ACM"},{"issue":"2","key":"23_CR2","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/293411.293461","volume":"42","author":"P. Benassi","year":"1999","unstructured":"Benassi, P.: TRUSTe: An online privacy seal program. Communication of the ACM, 42(2) (1999) 56\u201359","journal-title":"Communication of the ACM"},{"key":"23_CR3","first-page":"298","volume":"487","author":"J. Claessens","year":"1999","unstructured":"Claessens, J., Preneel, B., Vandewalle, J.: Solutions for anonymous communication on the Internet. Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology 487 (1999) 298\u2013303","journal-title":"Proceedings of the 1999 IEEE International Carnahan Conference on Security Technology"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Claypool, M., Le, P., Wased, M., Brown, D. Implicit Interest Indicators. Proceedings of IUI 2001 2001 International Conference on Intelligent User Interfaces (2001) 33\u201340.","DOI":"10.1145\/359784.359836"},{"key":"23_CR5","unstructured":"Crossen, A., Budzik, J., Warner, M., Birnbaum, L., Hammond, K. J. XLibris: An Automated Library Research assistant. Proceedings of IUI 2001 2001 International Conference on Intelligent User Interfaces (2001) 49\u201353."},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Elovici, Y., Shapira, B., Mashiach, A,: A New Privacy Model for Hiding Group Interests while Accessing the Web., In Proceedinsg of The ACM Workshop in Electronic Society, at The 9th ACM Conference on Computer and Communication Security, November 2002.","DOI":"10.1145\/644527.644534"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Elovici, Y., Shapira, B., Maschiach, A,: A New Privacy Model for Web Surfing. NGITS (2002) (Lecture Notes): 45\u201357","DOI":"10.1007\/3-540-45431-4_5"},{"key":"23_CR8","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/3-540-61996-8_37","volume-title":"Hiding Routing Information, Information Hiding","author":"D. M. Goldschlag","year":"1996","unstructured":"Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information, Information Hiding, R. Anderson (editor), Springer-Verlag LLNCS 1174 (1996) 137\u2013150"},{"issue":"3","key":"23_CR9","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/A:1011196000674","volume":"11","author":"U. Hanani","year":"2001","unstructured":"Hanani, U., Shapira, B. and Shoval, P. Information Filtering: Overview of issues, research and systems. User Modelling and User Adapted Interaction 11(3), (2001) 203\u2013259.","journal-title":"User Modelling and User Adapted Interaction"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Grabber, E., Gibbons, P.B., Matias, Y., Mayer, A.: How to Make Personalized Web Browsing Simple, Secure, and Anonymous. Proceedings of Financial Cryptography (1997)","DOI":"10.1007\/3-540-63594-7_64"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Lieberman, H., Autonomous Interface agents. Proceedings of the ACM Conference on Computers and Human Interfaces, CHI 97, Atlanta, Georgia (1997).","DOI":"10.1145\/258549.258592"},{"issue":"1","key":"23_CR12","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"M.K. Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions, ACM Transactions on Information and System Security, 1(1) (1998) 66\u201392","journal-title":"ACM Transactions on Information and System Security"},{"issue":"2","key":"23_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/293411.293778","volume":"42","author":"M.K. Reiter","year":"1999","unstructured":"Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds, Communications of the ACM 42(2) (1999) 32\u201338","journal-title":"Communications of the ACM"},{"key":"23_CR14","first-page":"44","volume-title":"Proceedings of the 18th Annual Symposium on Security and Privacy","author":"P. F. Syverson","year":"1997","unstructured":"Syverson, P. F., Goldschlag, D. M., & Reed, M. G. (1997). Anonymous Connections and Onion Routing, Proceedings of the 18th Annual Symposium on Security and Privacy, IEEE CS Press, Oakland, CA, 44\u201354"}],"container-title":["Lecture Notes in Computer Science","User Modeling 2003"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44963-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T04:30:49Z","timestamp":1556685049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44963-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403814","9783540449638"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-44963-9_23","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}