{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:30:59Z","timestamp":1740184259881,"version":"3.37.3"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:00:00Z","timestamp":1616630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Nat Comput Sci"],"DOI":"10.1038\/s43588-021-00047-6","type":"journal-article","created":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T18:40:05Z","timestamp":1616697605000},"page":"175-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data privacy through participant empowerment"],"prefix":"10.1038","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1248-3295","authenticated-orcid":false,"given":"Fida K.","family":"Dankar","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,25]]},"reference":[{"key":"47_CR1","doi-asserted-by":"crossref","unstructured":"Terry, S. F. Genet. Test. Mol. Biomark. 17, 443\u2013445 (2013).","DOI":"10.1089\/gtmb.2013.1545"},{"key":"47_CR2","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1159\/000336544","volume":"15","author":"EA Whitley","year":"2012","unstructured":"Whitley, E. A., Kanellopoulou, N. & Kaye, J. Pub. Health Genom. 15, 232\u2013242 (2012).","journal-title":"Pub. Health Genom."},{"key":"47_CR3","doi-asserted-by":"publisher","DOI":"10.1038\/s43588-021-00044-9","author":"D Grishin","year":"2021","unstructured":"Grishin, D. et al. Nat. Comput. Sci. https:\/\/doi.org\/10.1038\/s43588-021-00044-9 (2021).","journal-title":"Nat. Comput. Sci."},{"key":"47_CR4","unstructured":"Ducharme, J. Time https:\/\/time.com\/5257474\/golden-state-killer-genetic-privacy-concerns\/ (2018)."},{"key":"47_CR5","unstructured":"Huang, Z., Ayday, E., Fellay, J., Hubaux, J. & Juels, A. in 2015 IEEE Symp. Security and Privacy 447\u2013462 (IEEE, 2015)."},{"key":"47_CR6","doi-asserted-by":"publisher","first-page":"e12702","DOI":"10.2196\/12702","volume":"7","author":"FK Dankar","year":"2019","unstructured":"Dankar, F. K., Madathil, N., Dankar, S. K. & Boughorbel, S. JMIR Med. Inform. 7, e12702 (2019).","journal-title":"JMIR Med. Inform."},{"key":"47_CR7","doi-asserted-by":"publisher","first-page":"1873","DOI":"10.1093\/bioinformatics\/btw073","volume":"32","author":"J Wagner","year":"2016","unstructured":"Wagner, J., Paulson, J. N., Wang, X., Bhattacharjee, B. & Bravo, H. C. Bioinformatics 32, 1873\u20131879 (2016).","journal-title":"Bioinformatics"},{"key":"47_CR8","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1016\/j.csbj.2020.03.027","volume":"18","author":"FK Dankar","year":"2020","unstructured":"Dankar, F. K. et al. Comput. Struct. Biotechnol. J. 18, 913\u2013921 (2020).","journal-title":"Comput. Struct. Biotechnol. J."},{"key":"47_CR9","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I. & Jurik, M. in Proc. 4th Int. Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography 119\u2013136 (Springer, 2001).","DOI":"10.1007\/3-540-44586-2_9"},{"key":"47_CR10","doi-asserted-by":"publisher","DOI":"10.1186\/s13063-017-2035-z","volume":"18","author":"M Benchoufi","year":"2017","unstructured":"Benchoufi, M. & Ravaud, P. Trials 18, 335 (2017).","journal-title":"Trials"}],"container-title":["Nature Computational Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00047-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00047-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,3]],"date-time":"2022-12-03T22:01:14Z","timestamp":1670104874000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.nature.com\/articles\/s43588-021-00047-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,25]]},"references-count":10,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,3]]}},"alternative-id":["47"],"URL":"https:\/\/doi.org\/10.1038\/s43588-021-00047-6","relation":{},"ISSN":["2662-8457"],"issn-type":[{"type":"electronic","value":"2662-8457"}],"subject":[],"published":{"date-parts":[[2021,3,25]]},"assertion":[{"value":"25 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The author declares no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}