{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:57:26Z","timestamp":1725749846460},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410154"},{"type":"electronic","value":"9783642410161"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41016-1_18","type":"book-chapter","created":{"date-parts":[[2013,9,24]],"date-time":"2013-09-24T22:03:49Z","timestamp":1380060229000},"page":"164-173","source":"Crossref","is-referenced-by-count":1,"title":["A Simulator for Privacy Preserving Record Linkage"],"prefix":"10.1007","author":[{"given":"Alexandros","family":"Karakasidis","sequence":"first","affiliation":[]},{"given":"Vassilios S.","family":"Verykios","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Al-Lawati, A., Lee, D., McDaniel, P.: Blocking-aware private record linkage. In: IQIS, pp. 59\u201368 (2005)","DOI":"10.1145\/1077501.1077513"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Christen, P.: Febrl-: an open source data cleaning, deduplication and record linkage system with a graphical user interface. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1065\u20131068. ACM (2008)","DOI":"10.1145\/1401890.1402020"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Christen, P.: Data Matching. Data-Centric Systems and Applications. Springer (2012)","DOI":"10.1007\/978-3-642-31164-2"},{"key":"18_CR4","unstructured":"Cohen, W.W., Ravikumar, P., Fienberg, S.E.: A comparison of string distance metrics for name-matching tasks. In: IIWeb, pp. 73\u201378 (2003)"},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1023\/A:1009761603038","volume":"2","author":"M.A. Hern\u00e1ndez","year":"1998","unstructured":"Hern\u00e1ndez, M.A., Stolfo, S.J.: Real-world data is dirty: Data cleansing and the merge\/purge problem. Data Min. Knowl. Discov.\u00a02(1), 9\u201337 (1998)","journal-title":"Data Min. Knowl. Discov."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: ICDE, pp. 496\u2013505 (2008)","DOI":"10.1109\/ICDE.2008.4497458"},{"key":"18_CR7","first-page":"123","volume-title":"EDBT 2010","author":"A. Inan","year":"2010","unstructured":"Inan, A., Kantarcioglu, M., Ghinita, G., Bertino, E.: Private record matching using differential privacy. In: EDBT 2010, pp. 123\u2013134. ACM, New York (2010)"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Karakasidis, A., Verykios, V.S.: Privacy preserving record linkage using phonetic codes. In: Proceedings of the 4-th Balkan Conference of Informatics, pp. 101\u2013106 (2009)","DOI":"10.1109\/BCI.2009.29"},{"issue":"3","key":"18_CR9","doi-asserted-by":"crossref","first-page":"223","DOI":"10.5626\/JCSE.2011.5.3.223","volume":"5","author":"A. Karakasidis","year":"2011","unstructured":"Karakasidis, A., Verykios, V.S.: Secure blocking + secure matching = secure record linkage. JCSE\u00a05(3), 223\u2013235 (2011)","journal-title":"JCSE"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Karakasidis, A., Verykios, V.S.: A highly efficient and secure multidimensional blocking approach for private record linkage. In: 2012 IEEE 24th International Conference on Tools with Artificial Intelligence, pp. 428\u2013435 (2012)","DOI":"10.1109\/ICTAI.2012.65"},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1145\/2245276.2245444","volume-title":"SAC 2012: Proceedings of the 27th Annual ACM Symposium on Applied Computing","author":"A. Karakasidis","year":"2012","unstructured":"Karakasidis, A., Verykios, V.S.: Reference table based k-anonymous private blocking. In: SAC 2012: Proceedings of the 27th Annual ACM Symposium on Applied Computing, pp. 859\u2013864. ACM, New York (2012)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Karakasidis, A., Verykios, V.S.: A sorted neighborhood approach to multidimensional privacy preserving blocking. In: 2012 IEEE 12th International Conference on Data Mining Workshops, pp. 937\u2013944 (2012)","DOI":"10.1109\/ICDMW.2012.70"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-28879-1_2","volume-title":"Data Privacy Management and Autonomous Spontaneus Security","author":"A. Karakasidis","year":"2012","unstructured":"Karakasidis, A., Verykios, V.S., Christen, P.: Fake injection strategies for private phonetic matching. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol.\u00a07122, pp. 9\u201324. Springer, Heidelberg (2012)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1007\/978-3-642-22263-4_13","volume-title":"Privacy Enhancing Technologies","author":"M. Kuzu","year":"2011","unstructured":"Kuzu, M., Kantarcioglu, M., Durham, E., Malin, B.: A constraint satisfaction cryptanalysis of bloom filters in private record linkage. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol.\u00a06794, pp. 226\u2013245. Springer, Heidelberg (2011)"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1145\/2452376.2452398","volume-title":"Proceedings of the 16th International Conference on Extending Database Technology, EDBT 2013","author":"M. Kuzu","year":"2013","unstructured":"Kuzu, M., Kantarcioglu, M., Inan, A., Bertino, E., Durham, E., Malin, B.: Efficient privacy-aware record integration. In: Proceedings of the 16th International Conference on Extending Database Technology, EDBT 2013, pp. 167\u2013178. ACM, New York (2013)"},{"key":"18_CR16","series-title":"SCI","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-00179-6_5","volume-title":"Intelligent Patient Management","author":"C. Pang","year":"2009","unstructured":"Pang, C., Gu, L., Hansen, D., Maeder, A.: Privacy-Preserving Fuzzy Matching Using a Public Reference Table. In: McClean, S., Millard, P., El-Darzi, E., Nugent, C. (eds.) Intelligent Patient Management. SCI, vol.\u00a0189, pp. 71\u201389. Springer, Heidelberg (2009)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.K.: Privacy preserving schema and data matching. In: SIGMOD Conference, pp. 653\u2013664 (2007)","DOI":"10.1145\/1247480.1247553"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Schnell, R., Bachteler, T., Reiher, J.: Privacy-preserving record linkage using bloom filters. BMC Medical Informatics and Decision Making\u00a09(1), 41+ (2009)","DOI":"10.1186\/1472-6947-9-41"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41016-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T11:30:41Z","timestamp":1558092641000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41016-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410154","9783642410161"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41016-1_18","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}