{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:58:08Z","timestamp":1743026288210,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_22","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"353-361","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Simulation of Document Detection Methods and Reducing False Positives for Private Stream Searching"],"prefix":"10.1007","author":[{"given":"Michael","family":"Oehler","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dhananjay S.","family":"Phatak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"22_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/11535218_14","volume-title":"CRYPTO 2005","author":"R Ostrovsky","year":"2005","unstructured":"Ostrovsky, R., Skeith III, W.E.: Private searching on streaming data. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 223\u2013240. Springer, Heidelberg (2005)"},{"key":"22_CR2","series-title":"LNCS","first-page":"148","volume-title":"FC 2007 and USEC 2007","author":"G Danezis","year":"2007","unstructured":"Danezis, G., Diaz, C.: Space-efficient private search with applications to rateless codes. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 148\u2013162. Springer, Heidelberg (2007)"},{"key":"22_CR3","series-title":"LNCS","first-page":"223","volume-title":"EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999)"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Song, D., Waters, B.: New construction and practical applications for private stream searching. In: Security and Privacy (SP\u201906), pp. 132\u2013139 (2006)","DOI":"10.1109\/SP.2006.27"},{"issue":"3","key":"22_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1455526.1455529","volume":"12","author":"J Bethencourt","year":"2009","unstructured":"Bethencourt, J., Song, D., Waters, B.: New techniques for private stream searching. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3), 1\u201332 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Finiasz, M., ramchandran, K.: Private stream search at the same communication cost as a regular search: role of LDPC codes. In: ISIT\u201912, pp. 2566\u20132570 (2012)","DOI":"10.1109\/ISIT.2012.6283979"},{"key":"22_CR7","unstructured":"Oehler, M., Phatak, D.: A private packet filtering language for cyber defense. In: Annual Symposium on Information Assurance (ASIA\u201913), pp. 46\u201355 (2013)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:17:40Z","timestamp":1676377060000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}