{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:31:46Z","timestamp":1761597106214},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_2","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"15-29","source":"Crossref","is-referenced-by-count":13,"title":["Hiding a Needle in a Haystack Using Negative Databases"],"prefix":"10.1007","author":[{"given":"Fernando","family":"Esponda","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","first-page":"439","volume-title":"Proc. of the ACM SIGMOD Conference on Management of Data","author":"R. Agarwal","year":"2000","unstructured":"Agarwal, R., Srikant, R.: Privacy-preserving data minig. In: Proc. of the ACM SIGMOD Conference on Management of Data, pp. 439\u2013450. ACM Press, New York (2000)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Bender, W., Gruhl, D., Morimoto, N., Lu, A.: Techniques for data hiding. IBM Systems Journal (September-December 1996)","DOI":"10.1147\/sj.353.0313"},{"issue":"7","key":"2_CR3","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B.H. Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"2_CR4","unstructured":"Brinkman, R., Maubach, S., Jonker, W.: A lucky dip as a secure data store. In: Proceedings of Workshop on Information and System Security (2006)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1109\/TC.1986.1676819","volume":"C-35","author":"R.E. Bryant","year":"1986","unstructured":"Bryant, R.E.: Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers\u00a0\u00a0C-35, 677\u2013691 (1986)","journal-title":"IEEE Transactions on Computers\u00a0"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-540-75496-1_28","volume-title":"Information Security","author":"G. Danezis","year":"2007","unstructured":"Danezis, G., Diaz, G., Faust, S., K\u00e4sper, E., Troncoso, C., Preneel, B.: Efficient negative databases from cryptographic hash functions. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol.\u00a04779, pp. 423\u2013436. Springer, Heidelberg (2007)"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/11822035","volume-title":"Information and Communications Security","author":"M. Mare de","year":"2006","unstructured":"de Mare, M., Wright Secure, R.: Set membership using 3sat. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307. Springer, Heidelberg (2006)"},{"key":"2_CR8","unstructured":"Esponda, F.: Negative Representations of Information. PhD thesis, University of New Mexico (2005)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-540-30220-9_14","volume-title":"Artificial Immune Systems","author":"F. Esponda","year":"2004","unstructured":"Esponda, F., Ackley, E.S., Forrest, S., Helman, P.: On-line negative databases. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol.\u00a03239, pp. 175\u2013188. Springer, Heidelberg (2004)"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Esponda, F., Forrest, S., Helman, P.: Protecting data privacy through hard-to-reverse negative databases. International Journal of Information Security\u00a06(6), 403\u2013415 (2007)","DOI":"10.1007\/s10207-007-0030-1"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Esponda, F., Forrest, S., Helman, P.: Enhancing privacy through negative representations of data. Technical report, University of New Mexico (2004)","DOI":"10.21236\/ADA498766"},{"key":"2_CR12","unstructured":"Esponda, F., Trias, E., Ackley, E.S., Forrest, S.: A relational algebra for negative databases. Technical Report TR-CS-2007-18, University of New Mexico (2007)"},{"issue":"4","key":"2_CR13","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. Evolutionary Computation Journal\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation Journal"},{"key":"2_CR14","series-title":"Artech House computer security series","volume-title":"Information hiding techniques for steganography and digital watermarking","author":"S. Katzenbeisser","year":"2000","unstructured":"Katzenbeisser, S., Petitcolas, F.A.P. (eds.): Information hiding techniques for steganography and digital watermarking. Artech House computer security series. Artech House Inc., Norwood (2000)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/10719724_27","volume-title":"Information Hiding","author":"J. McHugh","year":"2000","unstructured":"McHugh, J.: Chaffing at the bit: Thoughts on a note by ronald rivest. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol.\u00a01768, pp. 395\u2013404. Springer, Heidelberg (2000)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Micali, S., Rabin, M., Kilian, J.: Zero-knowledge sets. In: Proc. FOCS 2003, p. 80 (2003)","DOI":"10.1109\/SFCS.2003.1238183"},{"key":"2_CR17","first-page":"102","volume-title":"CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security","author":"A. Narayanan","year":"2005","unstructured":"Narayanan, A., Shmatikov, V.: Obfuscated databases and group privacy. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 102\u2013111. ACM, New York (2005)"},{"issue":"7","key":"2_CR18","first-page":"1062","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information hiding-a survey. Proceedings of the IEEE special issue on protection of multimedia content\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proceedings of the IEEE special issue on protection of multimedia content"},{"key":"2_CR19","unstructured":"Princeton. zChaff (2004), http:\/\/ee.princeton.edu\/~chaff\/zchaff.php"},{"key":"2_CR20","unstructured":"Rivest, R.L.: Chaffing and winnowing: Confidentiality without encryption. MIT Lab for Computer Science (March 1998), http:\/\/theory.lcs.mit.edu\/~rivest\/chaffing.txt"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Rivest, R.L.: The md5 message-digest algorithm (1992)","DOI":"10.17487\/rfc1321"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:07:13Z","timestamp":1557853633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}