{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T04:36:49Z","timestamp":1777869409527,"version":"3.51.4"},"reference-count":78,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T00:00:00Z","timestamp":1774396800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"publisher","award":["407023611"],"award-info":[{"award-number":["407023611"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000269","name":"UK Research and Innovation Economic and Social Research Council","doi-asserted-by":"publisher","award":["ES\/W010321\/1"],"award-info":[{"award-number":["ES\/W010321\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100022943","name":"Universities Australia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100022943","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001655","name":"German Academic Exchange Service","doi-asserted-by":"publisher","award":["57559735"],"award-info":[{"award-number":["57559735"]}],"id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.is.2026.102720","type":"journal-article","created":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T18:07:51Z","timestamp":1774462071000},"page":"102720","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Information leakage in the practical linking of sensitive data: Parties, protocols, and adversaries"],"prefix":"10.1016","volume":"140","author":[{"given":"Peter","family":"Christen","sequence":"first","affiliation":[]},{"given":"Rainer","family":"Schnell","sequence":"additional","affiliation":[]},{"given":"Anushka","family":"Vidanage","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.is.2026.102720_b1","series-title":"Linking Sensitive Data","author":"Christen","year":"2020"},{"key":"10.1016\/j.is.2026.102720_b2","series-title":"Methodological Developments in Data Linkage","author":"Harron","year":"2015"},{"issue":"12","key":"10.1016\/j.is.2026.102720_b3","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.14778\/3229863.3229876","article-title":"Data integration and machine learning: A natural synergy","volume":"11","author":"Dong","year":"2018","journal-title":"VLDB Endow."},{"issue":"1","key":"10.1016\/j.is.2026.102720_b4","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1007\/s11192-018-2958-5","article-title":"Google Scholar to overshadow them all? Comparing the sizes of 12 academic search engines and bibliographic databases","volume":"118","author":"Gusenbauer","year":"2019","journal-title":"Scientometrics"},{"key":"10.1016\/j.is.2026.102720_b5","series-title":"Data Matching","author":"Christen","year":"2012"},{"key":"10.1016\/j.is.2026.102720_b6","series-title":"Synthesis Lectures on Data Management","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01835-0_4","article-title":"An Introduction to Duplicate Detection","author":"Naumann","year":"2010"},{"issue":"328","key":"10.1016\/j.is.2026.102720_b7","doi-asserted-by":"crossref","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","article-title":"A theory for record linkage","volume":"64","author":"Fellegi","year":"1969","journal-title":"J. Amer. Statist. Assoc."},{"issue":"3381","key":"10.1016\/j.is.2026.102720_b8","doi-asserted-by":"crossref","first-page":"954","DOI":"10.1126\/science.130.3381.954","article-title":"Automatic linkage of vital records","volume":"130","author":"Newcombe","year":"1959","journal-title":"Science"},{"issue":"12","key":"10.1016\/j.is.2026.102720_b9","doi-asserted-by":"crossref","first-page":"eabi8021","DOI":"10.1126\/sciadv.abi8021","article-title":"(Almost) all of entity resolution","volume":"8","author":"Binette","year":"2022","journal-title":"Sci. Adv."},{"issue":"1","key":"10.1016\/j.is.2026.102720_b10","article-title":"A position statement on population data science: The science of data about people","volume":"3","author":"McGrail","year":"2018","journal-title":"Int. J. Popul. Data Sci."},{"key":"10.1016\/j.is.2026.102720_b11","series-title":"2011 census England and Wales general report","author":"Office for National Statistics","year":"2015"},{"key":"10.1016\/j.is.2026.102720_b12","series-title":"2011 Census benefits evaluation report","author":"Office for National Statistics","year":"2019"},{"key":"10.1016\/j.is.2026.102720_b13","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.jpsychires.2022.07.012","article-title":"Early developmental vulnerabilities following exposure to domestic violence and abuse: findings from an Australian population cohort record linkage study","volume":"153","author":"Whitten","year":"2022","journal-title":"J. Psychiatr. Res."},{"key":"10.1016\/j.is.2026.102720_b14","series-title":"Longitudinal education outcomes (LEO) dataset","author":"U.K. Department for Education","year":"2024"},{"key":"10.1016\/j.is.2026.102720_b15","doi-asserted-by":"crossref","DOI":"10.1109\/TIFS.2021.3114026","article-title":"Modern privacy-preserving record linkage techniques: An overview","author":"Gkoulalas-Divanis","year":"2021","journal-title":"Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.is.2026.102720_b16","series-title":"Handbook of Big Data Technologies","first-page":"851","article-title":"Privacy-preserving record linkage for Big Data: Current approaches and research challenges","author":"Vatsalan","year":"2017"},{"key":"10.1016\/j.is.2026.102720_b17","doi-asserted-by":"crossref","unstructured":"R. Hall, S.E. Fienberg, Privacy-preserving record linkage, in: Privacy in Statistical Databases, Corfu, Greece, 2010, pp. 269\u2013283.","DOI":"10.1007\/978-3-642-15838-4_24"},{"issue":"6","key":"10.1016\/j.is.2026.102720_b18","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1016\/j.is.2012.11.005","article-title":"A taxonomy of privacy-preserving record linkage techniques","volume":"38","author":"Vatsalan","year":"2013","journal-title":"Inf. Syst."},{"issue":"2","key":"10.1016\/j.is.2026.102720_b19","first-page":"49","article-title":"Misconceptions in privacy protection and regulation","volume":"36","author":"Culnane","year":"2019","journal-title":"Law Context."},{"issue":"9","key":"10.1016\/j.is.2026.102720_b20","article-title":"Some methods for blindfolded record linkage","volume":"4","author":"Churches","year":"2004","journal-title":"BMC Med. Inform. Decis. Mak."},{"issue":"1","key":"10.1016\/j.is.2026.102720_b21","doi-asserted-by":"crossref","DOI":"10.1186\/1472-6947-9-41","article-title":"Privacy-preserving record linkage using Bloom filters","volume":"9","author":"Schnell","year":"2009","journal-title":"BMC Med. Inform. Decis. Mak."},{"key":"10.1016\/j.is.2026.102720_b22","doi-asserted-by":"crossref","DOI":"10.1145\/3589641","article-title":"A vulnerability assessment framework for privacy-preserving record linkage","author":"Vidanage","year":"2023","journal-title":"ACM Trans. Priv. Secur."},{"issue":"1","key":"10.1016\/j.is.2026.102720_b23","article-title":"A taxonomy of attacks on privacy-preserving record linkage","volume":"12","author":"Vidanage","year":"2022","journal-title":"J. Priv. Confidentiality"},{"issue":"3","key":"10.1016\/j.is.2026.102720_b24","doi-asserted-by":"crossref","first-page":"44","DOI":"10.3390\/jcp5030044","article-title":"A framework for the design of privacy-preserving record linkage systems","volume":"5","author":"Nie","year":"2025","journal-title":"J. Cybersecur. Priv."},{"key":"10.1016\/j.is.2026.102720_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.ijmedinf.2024.105582","article-title":"Implementing privacy preserving record linkage: Insights from Australian use cases","volume":"191","author":"Randall","year":"2024","journal-title":"Int. J. Med. Informatics"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b26","article-title":"Accuracy of privacy preserving record linkage for real world data in the United States: a systemic review","volume":"8","author":"Tyagi","year":"2025","journal-title":"J. Am. Med. Inform. Assoc. Open"},{"key":"10.1016\/j.is.2026.102720_b27","series-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"Schneier","year":"1996"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b28","first-page":"5","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"Lindell","year":"2009","journal-title":"J. Priv. Confidentiality"},{"key":"10.1016\/j.is.2026.102720_b29","series-title":"The Science of Quantitative Information Flow","author":"Alvim","year":"2020"},{"key":"10.1016\/j.is.2026.102720_b30","series-title":"Data Quality and Record Linkage Techniques","author":"Herzog","year":"2007"},{"key":"10.1016\/j.is.2026.102720_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2023.100567","article-title":"Private set intersection: A systematic literature review","volume":"49","author":"Morales","year":"2023","journal-title":"Comput. Sci. Rev."},{"issue":"1","key":"10.1016\/j.is.2026.102720_b32","article-title":"Thirty-three myths and misconceptions about population data: from data capture and processing to linkage","volume":"8","author":"Christen","year":"2023","journal-title":"Int. J. Popul. Data Sci."},{"key":"10.1016\/j.is.2026.102720_b33","unstructured":"F. Panse, A. D\u00fcjon, W. Wingerath, B. Wollmer, Generating realistic test datasets for duplicate detection at scale using historical voter data, in: International Conference on Extending Database Technology, 2021, pp. 570\u2013581."},{"key":"10.1016\/j.is.2026.102720_b34","series-title":"The Anonymisation Decision-making Framework 2nd Edition: European Practitioners\u2019 Guide","author":"Elliot","year":"2020"},{"key":"10.1016\/j.is.2026.102720_b35","series-title":"Five Safes: Designing Data Access for Research","author":"Desai","year":"2016"},{"key":"10.1016\/j.is.2026.102720_b36","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1016\/j.jbi.2015.12.004","article-title":"Privacy-preserving matching of similar patients","volume":"59","author":"Vatsalan","year":"2016","journal-title":"J. Biomed. Informatics"},{"key":"10.1016\/j.is.2026.102720_b37","doi-asserted-by":"crossref","unstructured":"M. Kuzu, M. Kantarcioglu, A. Inan, E. Bertino, E. Durham, B. Malin, Efficient privacy-aware record integration, in: International Conference on Extending Database Technology, Genoa, 2013, pp. 167\u2013178.","DOI":"10.1145\/2452376.2452398"},{"key":"10.1016\/j.is.2026.102720_b38","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.jbi.2013.12.003","article-title":"Privacy-preserving record linkage on large real world datasets","volume":"50","author":"Randall","year":"2014","journal-title":"J. Biomed. Inform."},{"issue":"2","key":"10.1016\/j.is.2026.102720_b39","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TKDE.2017.2761759","article-title":"FEDERAL: A framework for distance-aware privacy-preserving record linkage","volume":"30","author":"Karapiperis","year":"2017","journal-title":"Trans. Knowl. Data Eng."},{"key":"10.1016\/j.is.2026.102720_b40","doi-asserted-by":"crossref","unstructured":"T. Ranbaduge, P. Christen, R. Schnell, Secure and Accurate Two-step Hash Encoding for Privacy-Preserving Record Linkage, in: Pacific-Asia Conference on Knowledge Discovery and Data Mining, Singapore, 2020, pp. 139\u2013151.","DOI":"10.1007\/978-3-030-47436-2_11"},{"key":"10.1016\/j.is.2026.102720_b41","article-title":"Privacy-preserving record linkage using reference set based encoding: A single parameter method","volume":"113","author":"Ziyad","year":"2025","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2026.102720_b42","first-page":"10","article-title":"Novel attacks against non-interactive PPRL","author":"Sch\u00e4fer","year":"2025","journal-title":"Crypto Day Matters 38"},{"key":"10.1016\/j.is.2026.102720_b43","article-title":"Precise and fast cryptanalysis for Bloom filter based privacy-preserving record linkage","author":"Christen","year":"2018","journal-title":"Trans. Knowl. Data Eng."},{"key":"10.1016\/j.is.2026.102720_b44","doi-asserted-by":"crossref","unstructured":"A. Vidanage, P. Christen, T. Ranbaduge, R. Schnell, A Graph Matching Attack on Privacy-Preserving Record Linkage, in: ACM Conference on Information and Knowledge Management, Galway, 2020, pp. 1485\u20131494.","DOI":"10.1145\/3340531.3411931"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b45","article-title":"A privacy attack on multiple dynamic match-key based privacy-preserving record linkage","volume":"5","author":"Vidanage","year":"2020","journal-title":"Int. J. Popul. Data Sci."},{"key":"10.1016\/j.is.2026.102720_b46","doi-asserted-by":"crossref","unstructured":"C. Dwork, Differential privacy, in: International Colloquium on Automata, Languages and Programming, Venice, 2006, pp. 1\u201312.","DOI":"10.1007\/11787006_1"},{"key":"10.1016\/j.is.2026.102720_b47","series-title":"Statistical Confidentiality: Principles and Practice","author":"Duncan","year":"2011"},{"key":"10.1016\/j.is.2026.102720_b48","unstructured":"P. Samarati, L. Sweeney, Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression, Technical report, 1998."},{"issue":"5","key":"10.1016\/j.is.2026.102720_b49","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"K-anonymity: A model for protecting privacy","volume":"10","author":"Sweeney","year":"2002","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"10.1016\/j.is.2026.102720_b50","doi-asserted-by":"crossref","unstructured":"N. Li, T. Li, S. Venkatasubramanian, t-closeness: Privacy beyond k-anonymity and l-diversity, in: IEEE International Conference on Data Engineering, Istanbul, 2007, pp. 106\u2013115.","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b51","doi-asserted-by":"crossref","first-page":"401","DOI":"10.3233\/SJI-200704","article-title":"Random disclosure in confidential statistical databases","volume":"37","author":"Lenz","year":"2021","journal-title":"Stat. J. IAOS"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1456650.1456651","article-title":"Data fusion","volume":"41","author":"Bleiholder","year":"2008","journal-title":"ACM Comput. Surv."},{"issue":"6","key":"10.1016\/j.is.2026.102720_b53","doi-asserted-by":"crossref","DOI":"10.1136\/bmjopen-2016-011474","article-title":"Identifying risk factors for progression to critical care admission and death among individuals with acute pancreatitis: a record linkage analysis of Scottish healthcare databases","volume":"6","author":"Mole","year":"2016","journal-title":"BMJ Open"},{"key":"10.1016\/j.is.2026.102720_b54","series-title":"Data Privacy: Foundations, New Developments and the Big Data Challenge","author":"Torra","year":"2017"},{"key":"10.1016\/j.is.2026.102720_b55","series-title":"Guide to Data Privacy: Models, Technologies, Solutions","author":"Torra","year":"2022"},{"key":"10.1016\/j.is.2026.102720_b56","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1111\/j.1467-842X.2002.tb00682.x","article-title":"Research use of linked health data \u2013 a best practice protocol","volume":"26","author":"Kelman","year":"2002","journal-title":"Aust NZ J. Public Health"},{"key":"10.1016\/j.is.2026.102720_b57","doi-asserted-by":"crossref","unstructured":"A. Inan, M. Kantarcioglu, G. Ghinita, E. Bertino, Private record matching using differential privacy, in: International Conference on Extending Database Technology, Lausanne, 2010, pp. 123\u2013134.","DOI":"10.1145\/1739041.1739059"},{"key":"10.1016\/j.is.2026.102720_b58","unstructured":"D. Vatsalan, P. Christen, V.S. Verykios, An Efficient Two-Party Protocol for Approximate Matching in Private Record Linkage, in: Australasian Data Mining Conference, vol. 121, Ballarat, 2011, pp. 125\u2013136."},{"key":"10.1016\/j.is.2026.102720_b59","series-title":"Verkn\u00fcpfung der Leistungsbereiche Geburtshilfe und Neonatologie und Entwicklung von entsprechenden (Follow-up-) Qualit\u00e4tsindikatoren","author":"Richter","year":"2020"},{"key":"10.1016\/j.is.2026.102720_b60","series-title":"Das Manual der Krebsregistrierung","year":"2019"},{"key":"10.1016\/j.is.2026.102720_b61","series-title":"Not fit for purpose: A critical analysis of the \u2019five safes\u2019","author":"Culnane","year":"2020"},{"key":"10.1016\/j.is.2026.102720_b62","series-title":"The person and The Situation: Perspectives of Social Psychology","author":"Ross","year":"2011"},{"key":"10.1016\/j.is.2026.102720_b63","article-title":"Hacker types, motivations and strategies: A comprehensive framework","volume":"5","author":"Chng","year":"2022","journal-title":"Comput. Hum. Behav. Rep."},{"issue":"2","key":"10.1016\/j.is.2026.102720_b64","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3303771","article-title":"Insight into insiders and IT: A survey of insider threat taxonomies, analysis, modeling, and countermeasures","volume":"52","author":"Homoliak","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.is.2026.102720_b65","article-title":"Hacking, protection and the consequences of hacking","volume":"20","author":"Cekerevac","year":"2018","journal-title":"Komunikacie"},{"key":"10.1016\/j.is.2026.102720_b66","doi-asserted-by":"crossref","first-page":"511","DOI":"10.2307\/2808153","article-title":"Population statistics, the holocaust, and the Nuremberg trials","author":"Seltzer","year":"1998","journal-title":"Popul. Dev. Rev."},{"key":"10.1016\/j.is.2026.102720_b67","doi-asserted-by":"crossref","unstructured":"D. Vatsalan, P. Christen, V.S. Verykios, Efficient Two-party Private Blocking Based on Sorted Nearest Neighborhood Clustering, in: ACM Conference on Information and Knowledge Management, San Francisco, 2013, pp. 1949\u20131958.","DOI":"10.1145\/2505515.2505757"},{"key":"10.1016\/j.is.2026.102720_b68","series-title":"Vulnerabilities in the use of similarity tables in combination with pseudonymisation to preserve data privacy in the UK Office for National Statistics\u2019 privacy-preserving record linkage","author":"Culnane","year":"2017"},{"issue":"2","key":"10.1016\/j.is.2026.102720_b69","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2022.e08981","article-title":"Ensuring the ethical use of big data: lessons from secure data access","volume":"8","author":"Wiltshire","year":"2022","journal-title":"Heliyon"},{"key":"10.1016\/j.is.2026.102720_b70","series-title":"MPRA paper","article-title":"Challenges for statistical disclosure control in a world with big data and open data","author":"de Wolf","year":"2015"},{"key":"10.1016\/j.is.2026.102720_b71","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01878-7","article-title":"The four generations of entity resolution","author":"Papadakis","year":"2021"},{"issue":"1","key":"10.1016\/j.is.2026.102720_b72","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1093\/pubmed\/fdx037","article-title":"GUILD: Guidance for information about linking data sets","volume":"40","author":"Gilbert","year":"2017","journal-title":"J. Public Health"},{"key":"10.1016\/j.is.2026.102720_b73","series-title":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","first-page":"628","article-title":"Efficient cryptanalysis of Bloom filters for privacy-preserving record linkage","author":"Christen","year":"2017"},{"key":"10.1016\/j.is.2026.102720_b74","doi-asserted-by":"crossref","unstructured":"M. Kroll, S. Steinmetzer, Who Is 1011011111...1110110010? Automated Cryptanalysis of Bloom Filter Encryptions of Databases with Several Personal Identifiers, in: International Joint Conference on Biomedical Engineering Systems and Technologies, Lisbon, 2015, pp. 341\u2013356.","DOI":"10.1007\/978-3-319-27707-3_21"},{"issue":"4","key":"10.1016\/j.is.2026.102720_b75","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1007\/s00778-010-0214-6","article-title":"Anonymity meets game theory: secure data integration with malicious participants","volume":"20","author":"Mohammed","year":"2011","journal-title":"VLDB J."},{"key":"10.1016\/j.is.2026.102720_b76","doi-asserted-by":"crossref","unstructured":"Y. Aumann, Y. Lindell, Security against covert adversaries: Efficient protocols for realistic adversaries, in: Theory of Cryptography Conference, Amsterdam, 2007, pp. 137\u2013156.","DOI":"10.1007\/978-3-540-70936-7_8"},{"key":"10.1016\/j.is.2026.102720_b77","doi-asserted-by":"crossref","DOI":"10.1016\/j.is.2021.101930","article-title":"A critique and attack on \u201cblockchain-based privacy-preserving record linkage\u201d","volume":"108","author":"Christen","year":"2022","journal-title":"Inf. Syst."},{"key":"10.1016\/j.is.2026.102720_b78","doi-asserted-by":"crossref","unstructured":"V. Goyal, P. Mohassel, A. Smith, Efficient two party and multi party computation against covert adversaries, in: Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, 2008, pp. 289\u2013306.","DOI":"10.1007\/978-3-540-78967-3_17"}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437926000347?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0306437926000347?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T13:42:04Z","timestamp":1777556524000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0306437926000347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":78,"alternative-id":["S0306437926000347"],"URL":"https:\/\/doi.org\/10.1016\/j.is.2026.102720","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Information leakage in the practical linking of sensitive data: Parties, protocols, and adversaries","name":"articletitle","label":"Article Title"},{"value":"Information Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.is.2026.102720","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 The Authors. Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"102720"}}