{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T04:19:16Z","timestamp":1742444356556,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642275753"},{"type":"electronic","value":"9783642275760"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27576-0_8","type":"book-chapter","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T13:45:35Z","timestamp":1328190335000},"page":"93-101","source":"Crossref","is-referenced-by-count":5,"title":["Impeding Individual User Profiling in Shopper Loyalty Programs"],"prefix":"10.1007","author":[{"given":"Philip","family":"Marquardt","sequence":"first","affiliation":[]},{"given":"David","family":"Dagon","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Traynor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"AppShouter. CardStar iPhone App Review (2009), http:\/\/appshouter.com\/iphone-app-review\/iphone-app-review-cardstar\/"},{"key":"8_CR2","unstructured":"CardStar, Inc. CardStar (2009), http:\/\/www.mycardstar.com\/"},{"key":"8_CR3","unstructured":"Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN). Is Big Brother in Your Grocery Cart? (2009), http:\/\/www.nocards.org\/"},{"key":"8_CR4","unstructured":"Fischer, B.: AppAdvice: CardStar (2009), http:\/\/appadvice.com\/appnn\/2009\/02\/review-cardstar\/"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Gilles, B., Claude, C., Stefan, W.: Oblivious Transfers and Privacy Amplification. Journal of Cryptology\u00a016(4) (2003)","DOI":"10.1007\/s00145-002-0146-4"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Holma, H., Toskala, A. (eds.): HSDPA\/HSUPA for UMTS. John Wiley & Sons, Ltd. (2006)","DOI":"10.1002\/0470032634"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Huang, H.-F., Chang, C.-C.: A new design for efficient t-out-n oblivious transfer scheme. In: International Conference on Advanced Information Networking and Applications, vol.\u00a02, pp. 499\u2013502 (2005)","DOI":"10.1109\/AINA.2005.40"},{"key":"8_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-45472-1_17","volume-title":"Financial Cryptography","author":"P. McDaniel","year":"2001","unstructured":"McDaniel, P., Rubin, A.D.: A Response to Can We Eliminate Certificate Revocation Lists? In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 245\u2013258. Springer, Heidelberg (2001)"},{"key":"8_CR9","unstructured":"Naor, M., Pinkas, B.: Efficient Oblivious Transfer Protocols. In: Proceedings of SIAM Symposium on Discrete Algorithms (SODA) (2001)"},{"key":"8_CR10","unstructured":"National Cash Register (NCR). NCR RealPOS High Performance Bi-Optic Scanner\/Scale (2009), http:\/\/www.ncr.com\/products_and_services\/point_of_sale\/pos_scanners\/index.jsp"},{"key":"8_CR11","unstructured":"Popa, R.A., Balakrishan, H., Blumberg, A.J.: Vpriv: Protecting privacy in location-based vehicular services. In: Proceedings of the USENIX Security Symposium (2009)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Shankar, P., Ganapathy, V., Iftode, L.: Privately Querying Location-based Services with SybilQuery. In: Proceedings of the International Conference on Ubiquitous Computing (2009)","DOI":"10.1145\/1620545.1620550"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/3-540-49649-1_28","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"J.P. Stern","year":"1998","unstructured":"Stern, J.P.: A New and Efficient All-or-Nothing Disclosure of Secrets Protocol. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 357\u2013371. Springer, Heidelberg (1998)"},{"key":"8_CR14","unstructured":"Traynor, P., McDaniel, P., La Porta, T.: On Attack Causality in Internet-Connected Cellular Networks. In: Proceedings of the USENIX Security Symposium (SECURITY) (2007)"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/3-540-45664-3_11","volume-title":"Public Key Cryptography","author":"W.-G. Tzeng","year":"2002","unstructured":"Tzeng, W.-G.: Efficient 1-Out-n Oblivious Transfer Schemes. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol.\u00a02274, pp. 159\u2013171. Springer, Heidelberg (2002)"},{"key":"8_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-540-75551-7_5","volume-title":"Privacy Enhancing Technologies","author":"G. Zhong","year":"2007","unstructured":"Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol.\u00a04776, pp. 62\u201376. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27576-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T18:52:32Z","timestamp":1742410352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27576-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642275753","9783642275760"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27576-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}