{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:26:05Z","timestamp":1755221165460,"version":"3.43.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032006325","type":"print"},{"value":"9783032006332","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-00633-2_15","type":"book-chapter","created":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:27Z","timestamp":1754648127000},"page":"253-268","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hiding in\u00a0Plain Sight: Query Obfuscation via\u00a0Random Multilingual Searches"],"prefix":"10.1007","author":[{"given":"Anton","family":"Firc","sequence":"first","affiliation":[]},{"given":"Jan","family":"Klus\u00e1\u010dek","sequence":"additional","affiliation":[]},{"given":"Kamil","family":"Malinka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,9]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"Bhopale, S.D., Sahu, A., Pandyaji, K.: Web services recommendation system using machine learning algorithms. In: 2023 4th International Conference for Emerging Technology (INCET), pp.\u00a01\u20137 (2023). https:\/\/doi.org\/10.1109\/INCET57972.2023.10170205","DOI":"10.1109\/INCET57972.2023.10170205"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Bozdag, E.: Bias in algorithmic filtering and personalization. Ethics Inf. Technol. 15(3), 209\u2013227 (2013). https:\/\/doi.org\/10.1007\/s10676-013-9321-6","DOI":"10.1007\/s10676-013-9321-6"},{"issue":"4","key":"15_CR3","doi-asserted-by":"publisher","first-page":"720","DOI":"10.1108\/14684520910985693","volume":"33","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer, J., Solanas, A., Castell\u00e0-Roca, J.: h(k)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Rev. 33(4), 720\u2013744 (2009). https:\/\/doi.org\/10.1108\/14684520910985693","journal-title":"Online Inf. Rev."},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"144907","DOI":"10.1109\/ACCESS.2019.2944243","volume":"7","author":"CI Eke","year":"2019","unstructured":"Eke, C.I., Norman, A., Shuib, L., Nweke, H.F.: A survey of user profiling: state-of-the-art, challenges, and solutions. IEEE Access 7, 144907\u2013144924 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2944243","journal-title":"IEEE Access"},{"key":"15_CR5","unstructured":"European Parliament and Council of the European Union: General Data Protection Regulation (GDPR) - Article 5: Principles relating to processing of personal data (2016). https:\/\/gdpr-info.eu\/art-5-gdpr\/. Accessed 10 June 2025"},{"key":"15_CR6","doi-asserted-by":"publisher","unstructured":"Faggioli, G., Ferro, N.: Query obfuscation for information retrieval through differential privacy. In: European Conference on Information Retrieval (ECIR). Lecture Notes in Computer Science, vol. 14608, pp. 278\u2013294 (2024). https:\/\/doi.org\/10.1007\/978-3-031-56027-9_17","DOI":"10.1007\/978-3-031-56027-9_17"},{"key":"15_CR7","doi-asserted-by":"publisher","unstructured":"Freund, L., Toms, E.: Understanding the brevity of web queries, pp. 517\u2013518 (2005).https:\/\/doi.org\/10.1002\/meet.14504001103","DOI":"10.1002\/meet.14504001103"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Gervais, A., Shokri, R., Singla, A., Capkun, S., Lenders, V.: Quantifying web-search privacy. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 966\u2013977 (2014). https:\/\/doi.org\/10.1145\/2660267.2660367","DOI":"10.1145\/2660267.2660367"},{"key":"15_CR9","doi-asserted-by":"publisher","unstructured":"Guha, S., Cheng, B., Francis, P.: Challenges in measuring online advertising systems. In: IMC 2010,Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 81\u201387. Association for Computing Machinery, New York, NY, USA (2010). https:\/\/doi.org\/10.1145\/1879141.1879152","DOI":"10.1145\/1879141.1879152"},{"key":"15_CR10","doi-asserted-by":"publisher","unstructured":"Hannak, A., et al.: Measuring personalization of web search. In: Proceedings of the 22nd international conference on World Wide Web (2013). https:\/\/doi.org\/10.1145\/2488388.2488435","DOI":"10.1145\/2488388.2488435"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"2132","DOI":"10.1109\/TIFS.2023.3262123","volume":"18","author":"F Houssiau","year":"2023","unstructured":"Houssiau, F., Li\u00e9nart, T., Hendrickx, J., de Montjoye, Y.A.: Web privacy: a formal adversarial model for query obfuscation. IEEE Trans. Inf. Forensics Secur. 18, 2132\u20132147 (2023). https:\/\/doi.org\/10.1109\/TIFS.2023.3262123","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Howe, D., Nissenbaum, H.: Trackmenot: resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, vol. 23 (2009)","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"15_CR13","doi-asserted-by":"publisher","unstructured":"Ju\u00e1rez, M., Torra, V.: Toward a privacy agent for information retrieval. Int. J. Intell. Syst. 28(6), 606\u2013622 (2013). https:\/\/doi.org\/10.1002\/int.21595, https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/int.21595","DOI":"10.1002\/int.21595"},{"key":"15_CR14","unstructured":"Kanoje, S., Girase, S., Mukhopadhyay, D.: User profiling trends, techniques and applications. Int. J. Adv. Found. Res. Comput. 1, 2348\u20134853 (2014)"},{"key":"15_CR15","unstructured":"Klus\u00e1\u010dek, J.: Protection against profiling with random multilingual search. Master\u2019s thesis, Brno University of Technology, Brno, Czech republic (2024). https:\/\/www.vut.cz\/en\/students\/final-thesis\/detail\/153822"},{"key":"15_CR16","doi-asserted-by":"publisher","unstructured":"Kumar, K.: Privacy protection in personalized web search using obfuscation. Int. J. Emerg. Trends Eng. Res. 8(4), 1410\u20131416 (2020). https:\/\/doi.org\/10.30534\/ijeter\/2020\/76842020","DOI":"10.30534\/ijeter\/2020\/76842020"},{"key":"15_CR17","unstructured":"Lawrence, S.R.: Personalization of web search results using term, category, and link-based user profiles (2012)"},{"key":"15_CR18","doi-asserted-by":"publisher","unstructured":"Maylybaeva, G.A.: The order of communication complexity of pir-protocols 18, 505\u2013515 (2008). https:\/\/doi.org\/10.1515\/DMA.2008.036","DOI":"10.1515\/DMA.2008.036"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.4103\/aca.ACA_157_18","volume":"22","author":"P Mishra","year":"2019","unstructured":"Mishra, P., Pandey, C., Singh, U., Gupta, A., Sahu, C., Keshri, A.: Descriptive statistics and normality tests for statistical data. Ann. Card. Anaesth. 22, 67\u201372 (2019). https:\/\/doi.org\/10.4103\/aca.ACA_157_18","journal-title":"Ann. Card. Anaesth."},{"key":"15_CR20","doi-asserted-by":"publisher","unstructured":"Nahm, F.: Nonparametric statistical tests for the continuous data: the basic concept and the practical use. Korean J. Anesthesiol. 69, 8\u201314 (2016). https:\/\/doi.org\/10.4097\/kjae.2016.69.1.8","DOI":"10.4097\/kjae.2016.69.1.8"},{"key":"15_CR21","doi-asserted-by":"publisher","unstructured":"Peddinti, S.T., Saxena, N.: On the effectiveness of anonymizing networks for web search privacy. In: ASIACCS 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 483\u2013489. Association for Computing Machinery, New York, NY, USA (2011). https:\/\/doi.org\/10.1145\/1966913.1966984","DOI":"10.1145\/1966913.1966984"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Peddinti, S.T., Saxena, N.: Web search query privacy: evaluating query obfuscation and anonymizing networks. J. Comput. Secur. 22(1), 155\u2013199 (2014)","DOI":"10.3233\/JCS-130491"},{"issue":"1","key":"15_CR23","first-page":"50","volume":"158","author":"S Punagin","year":"2017","unstructured":"Punagin, S., Arya, A.: A novel query obfuscation scheme with user controlled privacy and personalization. Int. J. Comput. Appl. 158(1), 50\u201354 (2017)","journal-title":"Int. J. Comput. Appl."},{"key":"15_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s10032-002-0082-8","volume":"5","author":"K Schulz","year":"2002","unstructured":"Schulz, K., Mihov, S.: Fast string correction with levenshtein automata. Int. J. Doc. Anal. Recogn. 5, 67\u201385 (2002). https:\/\/doi.org\/10.1007\/s10032-002-0082-8","journal-title":"Int. J. Doc. Anal. Recogn."},{"issue":"1","key":"15_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-020-00660-9","volume":"10","author":"V Verma","year":"2020","unstructured":"Verma, V., Aggarwal, R.K.: A comparative analysis of similarity measures akin to the Jaccard index in collaborative recommendations: empirical and theoretical perspective. Soc. Netw. Anal. Min. 10(1), 1\u201316 (2020). https:\/\/doi.org\/10.1007\/s13278-020-00660-9","journal-title":"Soc. Netw. Anal. Min."},{"issue":"6","key":"15_CR26","doi-asserted-by":"publisher","first-page":"2719","DOI":"10.1109\/TDSC.2019.2962440","volume":"18","author":"C Wei","year":"2021","unstructured":"Wei, C., Gu, Q., Ji, S., Chen, W., Wang, Z., Beyah, R.: OB-WSPES: a uniform evaluation system for obfuscation-based web search privacy. IEEE Trans. Dependable Secure Comput. 18(6), 2719\u20132732 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2962440","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR27","doi-asserted-by":"publisher","unstructured":"Xu, Y., Wang, K., Zhang, B., Chen, Z.: Privacy-enhancing personalized web search. In: WWW 2007, Proceedings of the 16th International Conference on World Wide Web, pp. 591\u2013600. Association for Computing Machinery, New York, NY, USA (2007). https:\/\/doi.org\/10.1145\/1242572.1242652","DOI":"10.1145\/1242572.1242652"}],"container-title":["Lecture Notes in Computer Science","Availability, Reliability and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00633-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T10:15:30Z","timestamp":1754648130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00633-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032006325","9783032006332"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00633-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"9 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Availability, Reliability and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghent","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belgium","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ares-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.ares-conference.eu","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}