{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:11:20Z","timestamp":1765887080611},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_3","type":"book-chapter","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T21:22:43Z","timestamp":1224019363000},"page":"30-44","source":"Crossref","is-referenced-by-count":5,"title":["Information Leakage in Optimal Anonymized and Diversified Data"],"prefix":"10.1007","author":[{"given":"Chengfang","family":"Fang","sequence":"first","affiliation":[]},{"given":"Ee-Chien","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys, 515\u2013556 (1989)","key":"3_CR1","DOI":"10.1145\/76894.76895"},{"unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: 31st International Conference on Very Large Data Bases, pp. 901\u2013909 (2005)","key":"3_CR2"},{"unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: k-anonymity: Algorithms and hardness. Technical report, Stanford University (2004)","key":"3_CR3"},{"doi-asserted-by":"crossref","unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Anonymizing tables. In: 10th International Conference on Database Theory, pp. 246\u2013258 (2005)","key":"3_CR4","DOI":"10.1007\/978-3-540-30570-5_17"},{"unstructured":"Aggarwal, G., Feder, T., Kenthapadi, K., Motwani, R., Panigrahy, R., Thomas, D., Zhu, A.: Approximation algorithms for k-anonymity. Journal of Privacy Technology (2005)","key":"3_CR5"},{"doi-asserted-by":"crossref","unstructured":"Bayardo, R.J., Agrawal, R.: Data privacy through optimal k-anonymization. In: International Conference on Data Engineering, pp. 217\u2013228 (2005)","key":"3_CR6","DOI":"10.1109\/ICDE.2005.42"},{"doi-asserted-by":"crossref","unstructured":"Bettini, C., Wang, X.S., Jajodia, S.: Protecting privacy against location-based personal identification. Secure Data Management, 185\u2013199 (2005)","key":"3_CR7","DOI":"10.1007\/11552338_13"},{"unstructured":"Duncan, G.T., Feinberg, S.E.: Obtaining information while preserving privacy: A markov perturbation method for tabular data. In: Joint Statistical Meetings, pp. 351\u2013362 (1997)","key":"3_CR8"},{"doi-asserted-by":"crossref","unstructured":"Fung, B., Wang, K., Yu, P.: Top-down specialization for information and privacy preservation. In: International Conference on Data Engineering, pp. 205\u2013216 (2005)","key":"3_CR9","DOI":"10.1109\/ICDE.2005.143"},{"unstructured":"Gedik, B., Liu, L.: A customizable k-anonymity model for protecting location privacy. In: 25th International Conference on Distributed Computing Systems (2005)","key":"3_CR10"},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Mondrian multidimensional k-anonymity. In: International Conference on Data Engineering (2006)","key":"3_CR11","DOI":"10.1109\/ICDE.2006.101"},{"doi-asserted-by":"crossref","unstructured":"LeFevrea, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient fulldomain k-anonymity. In: SIGMOD (2005)","key":"3_CR12","DOI":"10.1145\/1066157.1066164"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: \u2113-diversity: Privacy beyond k-anonymity. In: International Conference on Data Engineering, p. 24 (2006)","key":"3_CR13","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"crossref","unstructured":"Meyerson, A., Williams, R.: On the complexity of optimal k-anonymity. In: 23rd ACM Symposium on the principles of Database Systems, pp. 223\u2013228 (2004)","key":"3_CR14","DOI":"10.1145\/1055558.1055591"},{"doi-asserted-by":"crossref","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. In: IEEE Transactions on Knowledge and Data Engineering, pp. 1010\u20131027 (2001)","key":"3_CR15","DOI":"10.1109\/69.971193"},{"unstructured":"Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical report, CMU, SRI (1998)","key":"3_CR16"},{"doi-asserted-by":"crossref","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 571\u2013588 (2002)","key":"3_CR17","DOI":"10.1142\/S021848850200165X"},{"doi-asserted-by":"crossref","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 557\u2013570 (2002)","key":"3_CR18","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"crossref","unstructured":"Xu, S., Yung, M.: k-anonymous secret handshakes with reusable credentials. In: 11th ACM Conference on Computer and Communications Security, pp. 158\u2013167 (2004)","key":"3_CR19","DOI":"10.1145\/1030083.1030105"},{"doi-asserted-by":"crossref","unstructured":"Yao, G., Feng, D.: A new k-anonymous message transmission protocol. In: 5th International Workshop on Information Security Applications, pp. 388\u2013399 (2004)","key":"3_CR20","DOI":"10.1007\/978-3-540-31815-6_31"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T13:07:03Z","timestamp":1557839223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}