{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:44:40Z","timestamp":1772725480453,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642137389","type":"print"},{"value":"9783642137396","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_1","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"1-16","source":"Crossref","is-referenced-by-count":20,"title":["Generalizing PIR for Practical Private Retrieval of Public Data"],"prefix":"10.1007","author":[{"given":"Shiyuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Divyakant","family":"Agrawal","sequence":"additional","affiliation":[]},{"given":"Amr","family":"El Abbadi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Mokbel, M.F., Chow, C.Y., Aref, W.G.: The new casper: A privacy-aware location-based database server. In: ICDE, pp. 1499\u20131500 (2007)","DOI":"10.1109\/ICDE.2007.369052"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private queries in location based services: anonymizers are not necessary. In: SIGMOD Conference, pp. 121\u2013132 (2008)","DOI":"10.1145\/1376616.1376631"},{"issue":"5","key":"1_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-71677-8_26","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"R. Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith III, W.E.: A survey of single-database private information retrieval: Techniques and applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol.\u00a04450, pp. 393\u2013411. Springer, Heidelberg (2007)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Koudas, N., Srivastava, D., Yu, T.: Aggregate query answering on anonymized tables. In: ICDE, pp. 116\u2013125 (2007)","DOI":"10.1109\/ICDE.2007.367857"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Workload-aware anonymization. In: KDD, pp. 277\u2013286 (2006)","DOI":"10.1145\/1150402.1150435"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Li, J., Tao, Y., Xiao, X.: Preservation of proximity privacy in publishing numerical sensitive data. In: SIGMOD Conference, pp. 473\u2013486 (2008)","DOI":"10.1145\/1376616.1376666"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS, pp. 364\u2013373 (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"1_CR9","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Network and Distributed System Security Symposium (2007)"},{"issue":"6","key":"1_CR10","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"1_CR11","unstructured":"Williams, P., Sion, R.: Usable private information retrieval. In: Network and Distributed System Security Symposium (2008)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: l-diversity: Privacy beyond k-anonymity. In: ICDE 24 (2006)","DOI":"10.1109\/ICDE.2006.1"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106\u2013115 (2007)","DOI":"10.1109\/ICDE.2007.367856"},{"key":"1_CR14","unstructured":"http:\/\/marauder.millersville.edu\/~bikenaga\/numbertheory\/numbertheorynotes.html : Number theory notes"},{"key":"1_CR15","unstructured":"Chor, B., Gilboa, N., Naor, M.: Private information retrieval by keywords. Technical Report TRCS 0917, Department of Computer Science, Technian (1997)"},{"issue":"5","key":"1_CR16","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1142\/S021848850200165X","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: Achieving k-anonymity privacy protection using generalization and suppression. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 571\u2013588 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: SIGMOD Conference, pp. 49\u201360 (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"1_CR18","unstructured":"Asuncion, A., Newman, D.: UCI machine learning repository (2007), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Wang, S., Agrawal, D., Abbadi, A.E.: Generalizing pir for practical private retrieval of public data. Technical Report 2009-16, Department of Computer Science, UCSB (2009)","DOI":"10.1007\/978-3-642-13739-6_1"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T23:58:32Z","timestamp":1740441512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}