{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:11:09Z","timestamp":1725516669050},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642312342"},{"type":"electronic","value":"9783642312359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31235-9_38","type":"book-chapter","created":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T12:12:45Z","timestamp":1339675965000},"page":"572-580","source":"Crossref","is-referenced-by-count":0,"title":["Trading Privacy for Information Loss in the Blink of an Eye"],"prefix":"10.1007","author":[{"given":"Alexandra","family":"Pilalidou","sequence":"first","affiliation":[]},{"given":"Panos","family":"Vassiliadis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6","key":"38_CR1","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng.\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: Efficient full-domain k-anonymity. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Baltimore, Maryland, USA, June 14-16, pp. 49\u201360 (2005)","key":"38_CR2","DOI":"10.1145\/1066157.1066164"},{"doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv.\u00a042(4) (2010)","key":"38_CR3","DOI":"10.1145\/1749603.1749605"},{"doi-asserted-by":"crossref","unstructured":"Park, H., Shim, K.: Approximate algorithms for k-anonymity. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Beijing, China, June 12-14, pp. 67\u201378 (2007)","key":"38_CR4","DOI":"10.1145\/1247480.1247490"},{"unstructured":"Aggarwal, C.C.: On k-anonymity and the curse of dimensionality. In: Proceedings of the 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Norway, August 30-September 2, pp. 901\u2013909 (2005)","key":"38_CR5"},{"unstructured":"U.C. Irvine Repository of Machine Learning Databases: Adult data set (1998), http:\/\/www.ics.uci.edu\/~mlearn","key":"38_CR6"},{"unstructured":"Pilalidou, A.: On-line negotiation for privacy preserving data publishing. MSc Thesis. MT 2010-15, Dept. of Computer Science, Univ. of Ioannina (2010), http:\/\/www.cs.uoi.gr\/~pvassil\/publications\/2012_SSDBM\/","key":"38_CR7"}],"container-title":["Lecture Notes in Computer Science","Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31235-9_38.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,23]],"date-time":"2023-06-23T10:34:53Z","timestamp":1687516493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31235-9_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312342","9783642312359"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31235-9_38","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}