{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:58:55Z","timestamp":1762210735644,"version":"3.40.4"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,12,11]],"date-time":"2012-12-11T00:00:00Z","timestamp":1355184000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s10207-012-0182-5","type":"journal-article","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T14:21:10Z","timestamp":1355149270000},"page":"129-149","source":"Crossref","is-referenced-by-count":30,"title":["On the measurement of privacy as an attacker\u2019s estimation error"],"prefix":"10.1007","volume":"12","author":[{"given":"David","family":"Rebollo-Monedero","sequence":"first","affiliation":[]},{"given":"Javier","family":"Parra-Arnau","sequence":"additional","affiliation":[]},{"given":"Claudia","family":"Diaz","sequence":"additional","affiliation":[]},{"given":"Jordi","family":"Forn\u00e9","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"182_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0121-9","volume-title":"Elements of Statistical Disclosure Control","author":"L Willenborg","year":"2001","unstructured":"Willenborg, L., DeWaal, T.: Elements of Statistical Disclosure Control. Springer, NewYork (2001)"},{"issue":"2","key":"182_CR2","first-page":"427","volume":"9","author":"TB Jabine","year":"1993","unstructured":"Jabine, T.B.: Statistical disclosure limitation practices at united states statistical agencies. J. Off. Stat. 9(2), 427\u2013454 (1993)","journal-title":"J. Off. Stat."},{"issue":"4","key":"182_CR3","first-page":"783","volume":"9","author":"CAW Citteur","year":"1993","unstructured":"Citteur, C.A.W., Willenborg, L.C.R.J.: Public use microdata files: current practices at national statistical bureaus. J. Off. Stat. 9(4), 783\u2013794 (1993)","journal-title":"J. Off. Stat."},{"issue":"1","key":"182_CR4","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1109\/69.979982","volume":"14","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J., Mateo-Sanz, J.M.: Practical data-oriented microaggregation for statistical disclosure control. IEEE Trans. Knowl. Data Eng. 14(1), 189\u2013201 (2002)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"182_CR5","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogenerous $$k$$ -anonymity through microaggregation. Data Min. Knowl. Discov. 11(2), 195\u2013212 (2005)","journal-title":"Data Min. Knowl. Discov."},{"unstructured":"Solanas, A., Mart\u00ednez-Ballest\u00e9, A., Domingo-Ferrer, J.: VMDAV: a multivariate microaggregation with variable group size. In: Proceedings in Computational Statistics (COMPSTAT), Springer, Rome, Italy (2006)","key":"182_CR6"},{"doi-asserted-by":"crossref","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Soriano, M.: Private location-based information retrieval via $$k$$ -anonymous clustering. In: Proceedings of the CNIT International Workshop on Digital Communication, Series Lecture Notes in Computer Science (LNCS), Sept. 2009, Springer, Sardinia, Italy, invited paper (2009)","key":"182_CR7","DOI":"10.1007\/978-1-4419-1674-7_41"},{"issue":"5","key":"182_CR8","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$ -Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl. Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzz. Knowl. Based Syst."},{"issue":"6","key":"182_CR9","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents\u2019 identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Truta, T.M., Vinay, B.: Privacy protection: $$p$$ -sensitive $$k$$ -anonymity property. In: Proceedings of the International Workshop on Privacy Data Management (PDM), Atlanta, GA, p. 94 (2006)","key":"182_CR10","DOI":"10.1109\/ICDEW.2006.116"},{"doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Gehrke, J., Kiefer, D., Venkitasubramanian, M.: $$l$$ -Diversity: privacy beyond $$k$$ -anonymity. In: Proceedings of the IEEE International Conference on Data Engineering (ICDE), Atlanta, GA, Apr 2006, p. 24 (2006)","key":"182_CR11","DOI":"10.1109\/ICDE.2006.1"},{"doi-asserted-by":"crossref","unstructured":"Li, N., Li, T., Venkatasubramanian, S.: $$t$$ -Closeness: privacy beyond $$k$$ -anonymity and $$l$$ -diversity. In: Proceedings of the IEEE International Conference on Data Engineering (ICDE), Istanbul, Turkey, Apr 2007, pp. 106\u2013115 (2007)","key":"182_CR12","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"crossref","unstructured":"Brickell, J., Shmatikov, V.: The cost of privacy: Destruction of data-mining utility in anonymized data publishing. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), Las Vegas, NV, Aug 2008 (2008)","key":"182_CR13","DOI":"10.1145\/1401890.1401904"},{"doi-asserted-by":"crossref","unstructured":"Dwork, C.: Differential privacy. In: Proceedings of the International Colloquium on Automata, Languages and Programming, Springer, pp. 1\u201312 (2006)","key":"182_CR14","DOI":"10.1007\/11787006_1"},{"doi-asserted-by":"crossref","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Domingo-Ferrer, J.: From $$t$$ -closeness-like privacy to postrandomization via information theory. IEEE Trans. Knowl. Data Eng., 22(11), 1623\u20131636, Nov. 2010. [Online]. Available: http:\/\/doi.ieeecomputersociety.org\/10.1109\/TKDE.2009.190 (2010)","key":"182_CR15","DOI":"10.1109\/TKDE.2009.190"},{"issue":"2","key":"182_CR16","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84\u201388 (1981)","journal-title":"Commun. ACM"},{"unstructured":"Cottrell, L.: Mixmaster and remailer attacks. [Online]. Available: http:\/\/obscura.com\/loki\/remailer\/remailer-essay.html (1994)","key":"182_CR17"},{"doi-asserted-by":"crossref","unstructured":"Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), Berkeley, CA, pp. 2\u201315, May (2003)","key":"182_CR18","DOI":"10.1109\/SECPRI.2003.1199323"},{"issue":"1","key":"182_CR19","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/S0198-9715(00)00040-5","volume":"25","author":"M Duckham","year":"2001","unstructured":"Duckham, M., Mason, K., Stell, J., Worboys, M.: A formal approach to imperfection in geographic information. Comput. Environ. Urban Syst. 25(1), 89\u2013103 (2001)","journal-title":"Comput. Environ. Urban Syst."},{"key":"182_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2769-2","volume-title":"Theory of Point Estimation","author":"EL Lehmann","year":"1983","unstructured":"Lehmann, E.L.: Theory of Point Estimation. Springer, New York (1983)"},{"issue":"1","key":"182_CR21","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inform. Syst. Secur. 1(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"doi-asserted-by":"crossref","unstructured":"Berthold, O., Pfitzmann, A., Standtke, R.: The disadvantages of free MIX routes and how to overcome them. In: Proceedings of the Designing Privacy Enhancing Technologies: Workshop Design Issues in Anonymity, Unobservability, Series Lecture Notes in Computer Science (LNCS), Springer, Berkeley, CA, July 2000, pp. 30\u201345 (2000)","key":"182_CR22","DOI":"10.1007\/3-540-44702-4_3"},{"doi-asserted-by":"crossref","unstructured":"Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), vol. 2482, pp. 41\u201353. Springer (2002)","key":"182_CR23","DOI":"10.1007\/3-540-36467-6_4"},{"doi-asserted-by":"crossref","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Series Lecture Notes in Computer Science (LNCS), vol. 2482, pp. 54\u201368. Springer, Apr 2002 (2002)","key":"182_CR24","DOI":"10.1007\/3-540-36467-6_5"},{"unstructured":"T\u00f3th, G., Horn\u00e1k, Z., Vajda, F.: Measuring anonymity revisited. In: Proceedings of the Nordic Workshop on Secure IT Systems, Nov, pp. 85\u201390 (2004)","key":"182_CR25"},{"doi-asserted-by":"crossref","unstructured":"Clau\u00df, S., Schiffner, S.: Structuring anonymity metrics. In: Proceedings of the ACM Workshop on Digital Identity Management (DIM), ACM, Fairfax, VA, Nov 2006, pp. 55\u201362 (2006)","key":"182_CR26","DOI":"10.1145\/1179529.1179539"},{"doi-asserted-by":"crossref","unstructured":"Syverson, P., Stubblebine, S.: Group principals and the formalization of anonymity. In: Proceedings of the World Congress on Formal Methods, pp. 814\u2013833 (1999)","key":"182_CR27","DOI":"10.1007\/3-540-48119-2_45"},{"doi-asserted-by":"crossref","unstructured":"Mauw, S., Verschuren, J., de Vink, E.P.: A formalization of anonymity and onion routing. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS), vol. 3193. Lecture Notes in Computer Science (LNCS), pp. 109\u2013124 (2004)","key":"182_CR28","DOI":"10.1007\/978-3-540-30108-0_7"},{"doi-asserted-by":"crossref","unstructured":"Feigenbaum, J., Johnson, A., Syverson, P.: A model of onion routing with provable anonymity. In: Proceedings of the Financial Cryptography and Data Security (FI), Springer (2007)","key":"182_CR29","DOI":"10.1007\/978-3-540-77366-5_9"},{"doi-asserted-by":"crossref","unstructured":"Edman, M., Sivrikaya, F., Yener, B.: A combinatorial approach to measuring anonymity. IEEE J. Intell. Secur. Inform. 356\u2013363 (2007)","key":"182_CR30","DOI":"10.1109\/ISI.2007.379497"},{"doi-asserted-by":"crossref","unstructured":"Gierlichs, B., Troncoso, C., D\u00edaz, C., Preneel, B., Verbauwhede, I.: Revisiting a combinatorial approach toward measuring anonymity. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, ACM, pp. 111\u2013116 (2008)","key":"182_CR31","DOI":"10.1145\/1456403.1456422"},{"doi-asserted-by":"crossref","unstructured":"Bagai, R., Lu, H., Li, R., Tang, B.: An accurate system-wide anonymity metric for probabilistic attacks. In: Proceedings of the Workshop on Privacy Enhancing Technologies (PET), Series Lecture Notes in Computer Science (LNCS), vol. 6794, pp. 117\u2013133, Springer (2011)","key":"182_CR32","DOI":"10.1007\/978-3-642-22263-4_7"},{"doi-asserted-by":"crossref","unstructured":"Shokri, R., Freudiger, J., Jadliwala, M., Hubaux, J.P.: A distortion-based metric for location privacy. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society (2009)","key":"182_CR33","DOI":"10.1145\/1655188.1655192"},{"doi-asserted-by":"crossref","unstructured":"Shokri, R., Theodorakopoulos, G., Boudec, J.Y.L., Hubaux, J.P.: Quantifying location privacy. In: Proceedings of the IEEE Symposium on Security and Privacy (SP), IEEE Comput. Soc., Washington, DC, USA, pp. 247\u2013262 (2011)","key":"182_CR34","DOI":"10.1109\/SP.2011.18"},{"unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)","key":"182_CR35"},{"key":"182_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-4286-2","volume-title":"Statistical Decision Theory and Bayesian Analysis","author":"JO Berger","year":"1985","unstructured":"Berger, J.O.: Statistical Decision Theory and Bayesian Analysis. Springer, New York (1985)"},{"key":"182_CR37","volume-title":"Pattern Classification","author":"RO Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley, New York (2001)","edition":"2"},{"issue":"2","key":"182_CR38","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1214\/aop\/1176991794","volume":"16","author":"PH Algoet","year":"1988","unstructured":"Algoet, P.H., Cover, T.M.: A sandwich proof of the Shannon-McMillan-Breiman theorem. Ann. Prob. 16(2), 899\u2013909 (1988)","journal-title":"Ann. Prob."},{"unstructured":"Shannon, C.E.: Coding theorems for a discrete source with a fidelity criterion. In: IRE National Convention Record, vol. 7, Part 4, pp. 142\u2013163 (1959)","key":"182_CR39"},{"issue":"6","key":"182_CR40","doi-asserted-by":"crossref","first-page":"843","DOI":"10.1109\/TAC.1979.1102177","volume":"24","author":"DB Reid","year":"1979","unstructured":"Reid, D.B.: An algorithm for tracking multiple targets. IEEE Trans. Autom. Control 24(6), 843\u2013854 (1979)","journal-title":"IEEE Trans. Autom. Control"},{"issue":"1","key":"182_CR41","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1093\/biomet\/57.1.97","volume":"57","author":"WK Hastings","year":"1970","unstructured":"Hastings, W.K.: Monte carlo sampling methods using markov chains and their applications. Biometrika 57(1), 97\u2013109 (1970)","journal-title":"Biometrika"},{"doi-asserted-by":"crossref","unstructured":"Danezis, G.: Statistical disclosure attacks: traffic confirmation in open environments. In: Proceedings of the Security and Privacy in the Age of Uncertainty (SEC), Athens, Greece, May 2003, pp. 421\u2013426 (2003)","key":"182_CR42","DOI":"10.1007\/978-0-387-35691-4_40"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0182-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-012-0182-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-012-0182-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T13:26:06Z","timestamp":1745414766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-012-0182-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12,11]]},"references-count":42,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["182"],"URL":"https:\/\/doi.org\/10.1007\/s10207-012-0182-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2012,12,11]]}}}