{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:33:57Z","timestamp":1758267237874},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,2,12]],"date-time":"2015-02-12T00:00:00Z","timestamp":1423699200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s12095-015-0125-x","type":"journal-article","created":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T03:59:08Z","timestamp":1423627148000},"page":"415-437","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Extended results on privacy against coalitions of users in user-private information retrieval protocols"],"prefix":"10.1007","volume":"7","author":[{"given":"Colleen M.","family":"Swanson","sequence":"first","affiliation":[]},{"given":"Douglas R.","family":"Stinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,12]]},"reference":[{"key":"125_CR1","unstructured":"Bras-Amor\u00f3s, M., Stokes, K., Greferath, M.: Problems related to combinatorial configurations with applications to P2P-user private information retrieval. In: Mathematical Theory of Networks and Systems (MTNS 2010), pp. 1267\u20131271 (2010)"},{"issue":"13\u201314","key":"125_CR2","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1016\/j.comcom.2009.05.009","volume":"32","author":"J Castell\u00e0-Roca","year":"2009","unstructured":"Castell\u00e0-Roca, J., Viejo, A., Herrera-Joancomart\u00ed, J.: Preserving user\u2019s privacy in web search engines. Comput. Commun. 32(13\u201314), 1541\u20131551 (2009)","journal-title":"Comput. Commun."},{"key":"125_CR3","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Designs. 2nd edn. Chapman & Hall\/CRC (2006)","DOI":"10.1201\/9781420010541"},{"key":"125_CR4","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J.: Coprivacy: Towards a theory of sustainable privacy. In: Domingo-Ferrer, J., Magkos, E. (eds.) , vol. 5262, pp. 258\u2013268. Springer (2010)","DOI":"10.1007\/978-3-642-15838-4_23"},{"key":"125_CR5","doi-asserted-by":"crossref","unstructured":"Domingo-Ferrer, J., Bras-Amor\u00f3s, M.: Peer-to-peer private information retrieval. In: Domingo-Ferrer, J., Saygin, Y. (eds.) Privacy in Statistical Databases (PSD 2008), Lecture Notes in Computer Science, vol. 5262, pp. 315\u2013323. Springer (2008)","DOI":"10.1007\/978-3-540-87471-3_26"},{"issue":"11","key":"125_CR6","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.1016\/j.datak.2009.06.004","volume":"68","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer, J., Bras-Amor\u00f3s, M., Wu, Q., Manj\u00f3n, J.A.: User-private information retrieval based on a peer-to-peer community. Data Knowl. Eng. 68(11), 1237\u20131252 (2009)","journal-title":"Data Knowl. Eng."},{"issue":"1","key":"125_CR7","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/j.ins.2011.09.010","volume":"185","author":"J Domingo-Ferrer","year":"2012","unstructured":"Domingo-Ferrer, J., Gonz\u00e1lez-Nicol\u00e1s, \u00da.: Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search. Inf. Sci. 185(1), 191\u2013204 (2012)","journal-title":"Inf. Sci."},{"issue":"4","key":"125_CR8","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1108\/14684520910985693","volume":"33","author":"J Domingo-Ferrer","year":"2009","unstructured":"Domingo-Ferrer, J., Solanas, A., Castell\u00e0-Roca, J.: h(k)-private information retrieval from privacy-uncooperative queryable databases. J. Online Inf. Rev. 33(4), 720\u2013744 (2009)","journal-title":"J. Online Inf. Rev."},{"key":"125_CR9","doi-asserted-by":"crossref","unstructured":"Howe, D., Nissenbaum, H.: TrackMeNot: Resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy, and Identity in a Networked Society, pp. 417\u2013436. Oxford University Press (2009)","DOI":"10.1093\/oso\/9780195372472.003.0023"},{"key":"125_CR10","doi-asserted-by":"crossref","unstructured":"Motwani, R., Raghavan, P.: Randomized Algorithms, chap. Tail Inequalities, pp. 67\u201373. Cambridge University Press (1995)","DOI":"10.1017\/CBO9780511814075.005"},{"issue":"5","key":"125_CR11","first-page":"641","volume":"9","author":"D Rebollo-Monedero","year":"2012","unstructured":"Rebollo-Monedero, D., Forn\u00e9, J., Domingo-Ferrer, J.: Query profile obfuscation by means of optimal query exchange between users. IEEE Trans. Dependable Secure Comput. 9(5), 641\u2013654 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"125_CR12","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. (TISSEC) 1(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"125_CR13","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.ins.2012.06.025","volume":"218","author":"D S\u00e1nchez","year":"2013","unstructured":"S\u00e1nchez, D., Castell\u00e0-Roca, J., Viejo, A.: Knowledge-based scheme to create privacy-preserving but semantically-related queries for web search engines. Inf. Sci. 218, 17\u201330 (2013)","journal-title":"Inf. Sci."},{"key":"125_CR14","volume-title":"Combinatorial Structures for Anonymous Database Search. Ph.D. Dissertation","author":"K Stokes","year":"2011","unstructured":"Stokes, K.: Combinatorial Structures for Anonymous Database Search. Ph.D. Dissertation. Universitat Rovira i Virgili, Tarragona (2011)"},{"issue":"4","key":"125_CR15","doi-asserted-by":"crossref","first-page":"1568","DOI":"10.1016\/j.camwa.2010.01.003","volume":"59","author":"K Stokes","year":"2010","unstructured":"Stokes, K., Bras-Amor\u00f3s, M.: Optimal configurations for peer-to-peer user-private information retrieval. Comput. Math. Appl. 59(4), 1568\u20131577 (2010)","journal-title":"Comput. Math. Appl."},{"key":"125_CR16","unstructured":"Stokes, K., Bras-Amor\u00f3s, M.: Combinatorial structures for an anonymous data search protocol. In: Workshop on Computational Security. Centre de Recerca Matem\u00e0tica (CRM), Barcelona (2011)"},{"key":"125_CR17","doi-asserted-by":"crossref","unstructured":"Stokes, K., Bras-Amor\u00f3s, M.: On query self-submission in peer-to-peer user-private information retrieval. In: Truta, T.M., Xiong, L., Fotouhi, F., Orsborn, K., Stefanova, S. (eds.) Privacy and Anonymity in Information Society (PAIS \u201911), pp. 7:1\u20137:5. ACM (2011)","DOI":"10.1145\/1971690.1971697"},{"key":"125_CR18","doi-asserted-by":"crossref","unstructured":"Stokes, K., Farr\u00e0s, O.: Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes. Des. Codes Crypt., 1\u201322 (2012)","DOI":"10.1007\/s10623-012-9745-8"},{"key":"125_CR19","doi-asserted-by":"crossref","first-page":"479","DOI":"10.3934\/amc.2012.6.479","volume":"6","author":"CM Swanson","year":"2012","unstructured":"Swanson, C.M., Stinson, D.R.: Extended combinatorial constructions for peer-to-peer user-private information retrieval. Adv. Math. Commun. 6, 479\u2013497 (2012)","journal-title":"Adv. Math. Commun."},{"issue":"05","key":"125_CR20","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain., Fuzziness Knowl.-Based Syst."},{"key":"125_CR21","unstructured":"Toubiana, V., Subramanian, L., Nissenbaum, H. TrackMeNot: Enhancing the privacy of web search (2011). CoRR arXiv: abs\/1109.4677"},{"issue":"9","key":"125_CR22","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1016\/j.comnet.2009.11.003","volume":"54","author":"A Viejo","year":"2010","unstructured":"Viejo, A., Castell\u00e0-Roca, J.: Using social networks to distort users\u2019 profiles generated by web search engines. Comput. Netw. 54(9), 1343\u20131357 (2010)","journal-title":"Comput. Netw."},{"key":"125_CR23","unstructured":"Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Network and Distributed System Security Symposium (NDSS 2002). The Internet Society (2002)"},{"issue":"4","key":"125_CR24","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"MK Wright","year":"2004","unstructured":"Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(4), 489\u2013522 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0125-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12095-015-0125-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-015-0125-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T04:32:16Z","timestamp":1717734736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12095-015-0125-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,12]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["125"],"URL":"https:\/\/doi.org\/10.1007\/s12095-015-0125-x","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,12]]}}}