{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:23:49Z","timestamp":1743042229097,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319179568"},{"type":"electronic","value":"9783319179575"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17957-5_12","type":"book-chapter","created":{"date-parts":[[2015,4,28]],"date-time":"2015-04-28T03:19:31Z","timestamp":1430191171000},"page":"183-196","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Privacy-Preserving Identity Scheme for Electronic Validation of Phase\u00a01 Clinical Trials"],"prefix":"10.1007","author":[{"given":"Hanna","family":"Farah","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Amyot","sequence":"additional","affiliation":[]},{"given":"Khaled El","family":"Emam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,29]]},"reference":[{"key":"12_CR1","first-page":"25","volume":"3","author":"R Baxter","year":"2003","unstructured":"Baxter, R., Christen, P., Churches, T.: A comparison of fast blocking methods for record linkage. ACM SIGKDD 3, 25\u201327 (2003)","journal-title":"ACM SIGKDD"},{"issue":"7","key":"12_CR2","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"12_CR3","unstructured":"Bouzelat, H., Quantin, C., Dusserre, L.: Extraction and anonymity protocol of medical file. In: Proc. AMIA Fall Symposium, pp. 323\u2012327. AMIA Inc. (1996)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Christen, P., Goiser, K.: Quality and complexity measures for data linkage and deduplication. In: Guillet, F.J., Hamilton, H.J. (eds.) Quality Measures in Data Mining. SCI, vol. 43, pp. 127\u2012151. Springer, Heidelberg (2007)","DOI":"10.1007\/978-3-540-44918-8_6"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Churches, T., Christen, P.: Some methods for blindfolded record linkage. BMC Medical Informatics and Decision Making 4(9), 17 pages (2004)","DOI":"10.1186\/1472-6947-4-9"},{"key":"12_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology - EUROCRYPT \u201897","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A Secure and Optimally Efficient Multi-authority Election Scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103\u2013118. Springer, Heidelberg (1997)"},{"key":"12_CR7","unstructured":"Durham, E.A.: A framework for accurate, efficient private record linkage. PhD Thesis, Biomedical Informatics, Vanderbilt University, USA (2012)"},{"issue":"3","key":"12_CR8","doi-asserted-by":"publisher","first-page":"101","DOI":"10.5626\/JCSE.2011.5.3.223","volume":"5","author":"A Karakasidis","year":"2011","unstructured":"Karakasidis, A., Verykios, V.S.: Secure blocking+secure matching = Secure record linkage. Journal of Computing Science and Engineering 5(3), 101\u2013106 (2011)","journal-title":"Journal of Computing Science and Engineering"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kroll, M., Steinmetzer, S.: Automated Cryptanalysis of Bloom Filter Encryptions of Health Records. arXiv preprint arXiv:1410.6739 (2014)","DOI":"10.2139\/ssrn.3530864"},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22263-4_13","volume-title":"Privacy Enhancing Technologies","author":"M Kuzu","year":"2011","unstructured":"Kuzu, M., Kantarcioglu, M., Durham, E., Malin, B.: A Constraint Satisfaction Cryptanalysis of Bloom Filters in Private Record Linkage. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 226\u2013245. Springer, Heidelberg (2011)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Niedermeyer, F., Steinmetzer, S., Kroll, M., Schnell, R.: Cryptanalysis of basic Bloom Filters used for Privacy Preserving Record Linkage. German RLC, Working Paper Series, WP-GRLC-2014-04 (2014)","DOI":"10.2139\/ssrn.3530867"},{"key":"12_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201899","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"issue":"1","key":"12_CR13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S1386-5056(98)00019-7","volume":"49","author":"C Quantin","year":"1998","unstructured":"Quantin, C., Bouzelat, H., Allaert, F.A.A., Benhamiche, A.M., Faivre, J., Dusserre, L.: How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure. International Journal of Medical Informatics 49(1), 117\u2013122 (1998)","journal-title":"International Journal of Medical Informatics"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: Proc. ACM SIGMOD, pp. 653\u2012664. ACM (2007)","DOI":"10.1145\/1247480.1247553"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Schnell, R., Bachteler, T., Reiher, J.: Privacy-preserving record linkage using Bloom filters. BMC Medical Informatics and Decision Making, 9(41), 11 pages (2009)","DOI":"10.1186\/1472-6947-9-41"},{"key":"12_CR16","unstructured":"The College of Physicians and Surgeons of Ontario Public Register Website: http:\/\/www.cpso.on.ca\/Public-Register\/Public-Register (accessed December 2014)"},{"key":"12_CR17","unstructured":"The Law Society of Upper Canada Directory Website: http:\/\/www2.lsuc.on.ca\/ LawyerParalegalDirectory (accessed December 2014)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Vatsalan, D., Christen, P., O\u2019Keefe, C.M., Verykios, V.S.: An evaluation framework for privacy-preserving record linkage. Journal of Privacy and Confidentiality 6(1), Article 3 (2014)","DOI":"10.29012\/jpc.v6i1.636"},{"issue":"e1","key":"12_CR19","doi-asserted-by":"publisher","first-page":"e157","DOI":"10.1136\/amiajnl-2011-000329","volume":"19","author":"SC Weber","year":"2012","unstructured":"Weber, S.C., Lowe, H., Das, A., Ferris, T.: A simple heuristic for blindfolded record linkage. Journal of the American Medical Informatics Association 19(e1), e157\u2013e161 (2012)","journal-title":"Journal of the American Medical Informatics Association"}],"container-title":["Lecture Notes in Business Information Processing","E-Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17957-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T16:21:28Z","timestamp":1674231688000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17957-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319179568","9783319179575"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17957-5_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 April 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}