{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T13:36:34Z","timestamp":1742391394894},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540220640"},{"type":"electronic","value":"9783540247753"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24775-3_15","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T23:48:20Z","timestamp":1284162500000},"page":"121-126","source":"Crossref","is-referenced-by-count":18,"title":["Blind Data Linkage Using n-gram Similarity Comparisons"],"prefix":"10.1007","author":[{"given":"Tim","family":"Churches","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Christen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","first-page":"15","volume":"2","author":"M. Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions \u2013 the HMAC construction. RSA Laboratories, CryptoBytes\u00a02, 15 (1996)","journal-title":"RSA Laboratories, CryptoBytes"},{"key":"15_CR2","unstructured":"Borst, F., Allaert, F.A., Quantin, C.: The Swiss Solution for Anonymous Chaining Patient Files. In: MEDINFO 2001 (2001)"},{"issue":"6","key":"15_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory\u00a0IT22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Fellegi, I., Sunter, A.: A Theory for Record Linkage. Journal of the American Statistical Society (1969)","DOI":"10.2307\/2286061"},{"key":"15_CR5","first-page":"3","volume":"26","author":"C.W. Kelman","year":"2002","unstructured":"Kelman, C.W., Bass, A.J., Holman, C.D.J.: Research use of linked health data \u2013 A best practice protocol. ANZ Journal of Public Health\u00a026, 3 (2002)","journal-title":"ANZ Journal of Public Health"},{"key":"15_CR6","unstructured":"Lait, A.J., Randell, B.: An Assessment of Name Matching Algorithms, Technical Report, Dept. of Computing Science, University of Newcastle upon Tyne, UK (1993)"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S1386-5056(98)00019-7","volume":"49","author":"C. Quantin","year":"1998","unstructured":"Quantin, C., Bouzelat, H., Allaert, F.A.A., Benhamiche, A.M., Faivre, J., Dusserre, L.: How to ensure data quality of an epidemiological follow-up: Quality assessment of an anonymous record linkage procedure. Intl. Journal of Medical Informatics\u00a049, 117\u2013122 (1998)","journal-title":"Intl. Journal of Medical Informatics"},{"key":"15_CR8","volume-title":"Applied Cryptography","author":"B. Schneider","year":"1996","unstructured":"Schneider, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)","edition":"2"},{"key":"15_CR9","unstructured":"Winkler, W.E.: The State of Record Linkage and Current Research Problems. RR99\/03, US Bureau of the Census (1999)"},{"key":"15_CR10","unstructured":"Winkler, W.E.: Using the EM algorithm for weight computation in the Fellegi- Sunter model of record linkage. RR00\/05, US Bureau of the Census (2000)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24775-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T22:05:56Z","timestamp":1558303556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24775-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220640","9783540247753"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24775-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}