{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T07:32:52Z","timestamp":1773300772441,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319458700","type":"print"},{"value":"9783319458717","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45871-7_17","type":"book-chapter","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T08:25:24Z","timestamp":1472113524000},"page":"271-282","source":"Crossref","is-referenced-by-count":4,"title":["Analyzing Randomized Response Mechanisms Under Differential Privacy"],"prefix":"10.1007","author":[{"given":"Atsushi","family":"Waseda","sequence":"first","affiliation":[]},{"given":"Ryo","family":"Nojima","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,26]]},"reference":[{"issue":"319","key":"17_CR1","doi-asserted-by":"crossref","first-page":"990","DOI":"10.1080\/01621459.1967.10500910","volume":"62","author":"ALA Abul-Ela","year":"1967","unstructured":"Abul-Ela, A.L.A., Greenberg, G.G., Horvitz, D.G.: A multi-proportions randomized response model. J. Am. Stat. Assoc. 62(319), 990\u20131008 (1967)","journal-title":"J. Am. Stat. Assoc."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Andr\u00e9s, M.E., Bordenabe, N.E., Chatzikokolakis, K., Palamidessi, C.: Geo-indistinguishability: differential privacy for location-based systems. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pp. 901\u2013914. ACM (2013)","DOI":"10.1145\/2508859.2516735"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Aoki, S., Iwai, M., Sezaki, K.: Limited negative surveys: privacy-preserving participatory sensing. In: 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET), pp. 158\u2013160. IEEE (2012)","DOI":"10.1109\/CloudNet.2012.6483674"},{"issue":"4","key":"17_CR4","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1587\/transcom.E97.B.721","volume":"97","author":"S Aoki","year":"2014","unstructured":"Aoki, S., Sezaki, K.: Negative surveys with randomized response techniques for privacy-aware participatory sensing. IEICE Trans. Commun. 97(4), 721\u2013729 (2014)","journal-title":"IEICE Trans. Commun."},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Dankar, F.K., El Emam, K.: The application of differential privacy to health data. In: Proceedings of the 2012 Joint EDBT\/ICDT Workshops, pp. 158\u2013166. ACM (2012)","DOI":"10.1145\/2320765.2320816"},{"issue":"1","key":"17_CR6","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1002\/phar.1166","volume":"33","author":"P Dietz","year":"2013","unstructured":"Dietz, P., Striegel, H., Franke, A.G., Lieb, K., Simon, P., Ulrich, R.: Randomized response estimates for the 12-month prevalence of cognitive-enhancing drug use in university students. Pharmacother. J. Hum. Pharmacol. Drug Ther. 33(1), 44\u201350 (2013)","journal-title":"Pharmacother. J. Hum. Pharmacol. Drug Ther."},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Du, W., Zhan, Z.: Using randomized response techniques for privacy-preserving data mining. In: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 505\u2013510. ACM (2003)","DOI":"10.1145\/956750.956810"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"issue":"3\u20134","key":"17_CR9","first-page":"211","volume":"9","author":"C Dwork","year":"2014","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3\u20134), 211\u2013407 (2014)","journal-title":"Found. Trends Theor. Comput. Sci."},{"issue":"4","key":"17_CR10","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/0378-3758(83)90002-2","volume":"7","author":"BH Eichhorn","year":"1983","unstructured":"Eichhorn, B.H., Hayre, L.S.: Scrambled randomized response methods for obtaining sensitive quantitative data. J. Stat. Plan. Infer. 7(4), 307\u2013316 (1983)","journal-title":"J. Stat. Plan. Infer."},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Erlingsson, \u00da., Pihur, V., Korolova, A.: RAPPOR: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1054\u20131067. ACM (2014)","DOI":"10.1145\/2660267.2660348"},{"key":"17_CR12","unstructured":"Esponda, F.: Negative surveys. arXiv preprint math\/0608176 (2006)"},{"issue":"5","key":"17_CR13","doi-asserted-by":"crossref","first-page":"1045","DOI":"10.1037\/0033-2909.84.5.1045","volume":"84","author":"DS Fidler","year":"1977","unstructured":"Fidler, D.S., Kleinknecht, R.E.: Randomized response versus direct questioning: two data-collection methods for sensitive information. Psychol. Bull. 84(5), 1045 (1977)","journal-title":"Psychol. Bull."},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Friedman, A., Schuster, A.: Data mining with differential privacy. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 493\u2013502. ACM (2010)","DOI":"10.1145\/1835804.1835868"},{"issue":"326","key":"17_CR15","doi-asserted-by":"crossref","first-page":"520","DOI":"10.1080\/01621459.1969.10500991","volume":"64","author":"BG Greenberg","year":"1969","unstructured":"Greenberg, B.G., Abul-Ela, A.L.A., Simmons, W.R., Horvitz, D.G.: The unrelated question randomized response model: theoretical framework. J. Am. Stat. Assoc. 64(326), 520\u2013539 (1969)","journal-title":"J. Am. Stat. Assoc."},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Groat, M.M., Edwards, B., Horey, J., He, W., Forrest, S.: Enhancing privacy in participatory sensing applications with multidimensional data. In: 2012 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 144\u2013152. IEEE (2012)","DOI":"10.1109\/PerCom.2012.6199861"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Horey, J., Forrest, S., Groat, M.: Reconstructing spatial distributions from anonymized locations. In: 2012 IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 243\u2013250. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.82"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Horey, J., Groat, M.M., Forrest, S., Esponda, F.: Anonymous data collection in sensor networks. In: Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2007, pp. 1\u20138. IEEE (2007)","DOI":"10.1109\/MOBIQ.2007.4451016"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Huang, Z., Du, W.: OptRR: optimizing randomized response schemes for privacy-preserving data mining. In: IEEE 24th International Conference on Data Engineering, ICDE 2008, pp. 705\u2013714. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497479"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: Proceedings of the 13th International Conference on Extending Database Technology, pp. 123\u2013134. ACM (2010)","DOI":"10.1145\/1739041.1739059"},{"issue":"2","key":"17_CR21","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1093\/biomet\/77.2.436","volume":"77","author":"AY Kuk","year":"1990","unstructured":"Kuk, A.Y.: Asking sensitive questions indirectly. Biometrika 77(2), 436\u2013438 (1990)","journal-title":"Biometrika"},{"issue":"2","key":"17_CR22","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1177\/0049124106290442","volume":"35","author":"D Lara","year":"2006","unstructured":"Lara, D., Garc\u00eda, S.G., Ellertson, C., Camlin, C., Su\u00e1rez, J.: The measure of induced abortion levels in Mexico using random response technique. Sociol. Meth. Res. 35(2), 279\u2013301 (2006)","journal-title":"Sociol. Meth. Res."},{"issue":"1","key":"17_CR23","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/j.2517-6161.1994.tb01962.x","volume":"56","author":"NS Mangat","year":"1994","unstructured":"Mangat, N.S.: An improved randomized response strategy. J. R. Stat. Soc. Ser. B (Methodol.) 56(1), 93\u201395 (1994)","journal-title":"J. R. Stat. Soc. Ser. B (Methodol.)"},{"issue":"2","key":"17_CR24","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/biomet\/77.2.439","volume":"77","author":"N Mangat","year":"1990","unstructured":"Mangat, N., Singh, R.: An alternative randomized response procedure. Biometrika 77(2), 439\u2013442 (1990)","journal-title":"Biometrika"},{"key":"17_CR25","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1007\/11731139_73","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H Polat","year":"2006","unstructured":"Polat, H., Du, W.: Achieving private recommendations using randomized response techniques. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 637\u2013646. Springer, Heidelberg (2006)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Quercia, D., Leontiadis, I., McNamara, L., Mascolo, C., Crowcroft, J.: SpotME if you can: randomized responses for location obfuscation on mobile phones. In: 2011 31st International Conference on Distributed Computing Systems (ICDCS), pp. 363\u2013372. IEEE (2011)","DOI":"10.1109\/ICDCS.2011.79"},{"issue":"309","key":"17_CR27","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1080\/01621459.1965.10480775","volume":"60","author":"SL Warner","year":"1965","unstructured":"Warner, S.L.: Randomized response: a survey technique for eliminating evasive answer bias. J. Am. Stat. Assoc. 60(309), 63\u201369 (1965)","journal-title":"J. Am. Stat. Assoc."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45871-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,19]],"date-time":"2024-06-19T01:50:24Z","timestamp":1718761824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45871-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319458700","9783319458717"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45871-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}