{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T18:34:51Z","timestamp":1771266891069,"version":"3.50.1"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2012,3,30]],"date-time":"2012-03-30T00:00:00Z","timestamp":1333065600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s00779-012-0513-6","type":"journal-article","created":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T13:36:12Z","timestamp":1333028172000},"page":"653-662","source":"Crossref","is-referenced-by-count":45,"title":["Re-identification of Smart Meter data"],"prefix":"10.1007","volume":"17","author":[{"given":"Erik","family":"Buchmann","sequence":"first","affiliation":[]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[]},{"given":"Thorben","family":"Burghardt","sequence":"additional","affiliation":[]},{"given":"Stephan","family":"Kessler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,30]]},"reference":[{"key":"513_CR1","unstructured":"Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. New York Times, New York"},{"key":"513_CR2","unstructured":"Barbu C, Kr\u00f6ner A, Schneider M, Jacobs O (2009) Studying the functions of sharable digital memories. IADIS Int J WWW\/Internet (IJWI) 7(1):44\u201362"},{"key":"513_CR3","unstructured":"Bundesrepublik Deutschland (2003) Bundesdatenschutzgesetz (BDSG). Bundesgesetzblatt I\/2003 S.66"},{"key":"513_CR4","unstructured":"Chaudhari J, Cheung SS, Venkatesh MV (2007) Privacy protection for life-log video. In: Proceedings of the workshop on signal processing applications for public security and forensics"},{"key":"513_CR5","doi-asserted-by":"crossref","unstructured":"Cunningham S, Truta TM (2008) Protecting privacy in recorded conversations. In: Proceedings of the 1st international workshop on privacy and anonymity in the information society (PAIS\u201908)","DOI":"10.1145\/1379287.1379295"},{"key":"513_CR6","unstructured":"Dalenius T (1986) Finding a needle in a haystack or identifying anonymous census record. J Off Stat 2(3):329\u2013336"},{"key":"513_CR7","unstructured":"European parliament and the council of the European Union: (1995) Directive 95\/46\/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off J L 281, 11\/23\/1995, p. 31"},{"key":"513_CR8","doi-asserted-by":"crossref","unstructured":"Gemmell J, Bell G, Lueder R (2006) MyLifeBits: a personal database for everything. Commun ACM (CACM) 49","DOI":"10.1145\/1107458.1107460"},{"key":"513_CR9","doi-asserted-by":"crossref","unstructured":"Golle P (2006) Revisiting the uniqueness of simple demographics in the US population. In: Proceedings of the 5th workshop on privacy in the electronic society (WPES\u201906)","DOI":"10.1145\/1179601.1179615"},{"key":"513_CR10","unstructured":"Greveler U, Justus B, L\u00f6hr D (2011) Hintergrund und experimentelle Ergebnisse zum Thema \u201cSmart Meter und Datenschutz\u201d. Available at http:\/\/www.daprim.de"},{"key":"513_CR11","doi-asserted-by":"crossref","unstructured":"Hart GW (1992) Nonintrusive appliance load monitoring. Proc IEEE 80(12):1870\u20131891","DOI":"10.1109\/5.192069"},{"key":"513_CR12","doi-asserted-by":"crossref","unstructured":"Kim H, Marwah M, Arlitt M, Lyon G, Hand J (2011) Unsupervised disaggregation of low frequency power measurements. In: Proceedings of the 2011 SIAM international conference on data mining (SDM\u201911)","DOI":"10.1137\/1.9781611972818.64"},{"key":"513_CR13","doi-asserted-by":"crossref","unstructured":"Kr\u00f6ner A, Schneider M, Mori J (2009) A framework for ubiquitous content sharing. IEEE Perv Comput 8:58\u201365","DOI":"10.1109\/MPRV.2009.65"},{"key":"513_CR14","doi-asserted-by":"crossref","unstructured":"Machanavajjhala A, Gehrke J, Kifer D, Venkitasubramaniam M (2006) l-diversity: privacy beyond k-anonymity. In: Proceedings of the 22nd international conference on data engineering (ICDE\u201906)","DOI":"10.1109\/ICDE.2006.1"},{"key":"513_CR15","doi-asserted-by":"crossref","unstructured":"Mann S (1997) Smart clothing: the wearable computer and wearcam. Pers Ubiquit Comput 1(1):21\u201327","DOI":"10.1007\/BF01317885"},{"key":"513_CR16","doi-asserted-by":"crossref","unstructured":"Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin D (2010) Private memoirs of a Smart Meter. In: Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building","DOI":"10.1145\/1878431.1878446"},{"key":"513_CR17","doi-asserted-by":"crossref","unstructured":"Nergiz ME, Atzori M, Saygin Y (2008) Towards trajectory anonymization: a generalization-based approach. In: Proceedings of the SIGSPATIAL ACM GIS 2008 international workshop on security and privacy in GIS and LBS","DOI":"10.1145\/1503402.1503413"},{"key":"513_CR18","unstructured":"Ninghui L, Tiancheng L, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the 23rd international conference on data engineering (ICDE\u201907)"},{"key":"513_CR19","doi-asserted-by":"crossref","unstructured":"O\u2019Hara K, Tuffield M, Shadbolt N (2009) Lifelogging: privacy and empowerment with memories for life. IDIS 1(2):155\u2013172","DOI":"10.1007\/s12394-009-0008-4"},{"key":"513_CR20","doi-asserted-by":"crossref","unstructured":"Rawassizadeh R, Tjoa A (2010) Securing shareable life-logs. In: Proceedings of the 2nd international conference on social computing (SocialCom\u201910)","DOI":"10.1109\/SocialCom.2010.164"},{"issue":"5","key":"513_CR21","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney L (2002) k-Anonymity: a model for protecting privacy. Int J Uncertain Fuzz Knowl Based Syst 10(5):557\u2013570","journal-title":"Int J Uncertainty. Fuzziness and Knowledge-Based Systems"},{"key":"513_CR22","doi-asserted-by":"crossref","unstructured":"Yonezawa T, Okamoto N, Yamazoe H, Abe S, Hattori F, Hagita N (2011) Privacy protected life-context-aware alert by simplified sound spectrogram from microphone sensor. In: Proceedings of the 5th ACM workshop on context-awareness for self-managing systems","DOI":"10.1145\/2036146.2036148"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0513-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-012-0513-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-012-0513-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T10:33:36Z","timestamp":1713782016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-012-0513-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,30]]},"references-count":22,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["513"],"URL":"https:\/\/doi.org\/10.1007\/s00779-012-0513-6","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,30]]}}}