{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:25:16Z","timestamp":1761611116584},"reference-count":12,"publisher":"Informa UK Limited","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2002,1]]},"DOI":"10.1080\/00207160214651","type":"journal-article","created":{"date-parts":[[2003,9,18]],"date-time":"2003-09-18T22:32:58Z","timestamp":1063924378000},"page":"1265-1271","source":"Crossref","is-referenced-by-count":6,"title":["On Range Query Usability Of Statistical Databases"],"prefix":"10.1080","volume":"79","author":[{"given":"Ljiljana","family":"Brankovi\u0106","sequence":"first","affiliation":[]},{"given":"Mirka","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Jozef","family":"S\u02c7IR\u00c1N\u02c7","sequence":"additional","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/76894.76895"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1137\/S0895480198345004"},{"key":"CIT0003","first-page":"173","volume":"22","author":"Brankovic L.","year":"1995","journal-title":"Australian Mathematical Society GAZETTE"},{"key":"CIT0004","first-page":"169","author":"Brankovic L.","year":"1996","journal-title":"Congressus Numerantium"},{"key":"CIT0005","unstructured":"Brankovic, L., Miller, M. and Siran, J. Towards a practical auditing method for the prevention of statistical database compromise. Proceedings of the Seventh Australasian Database Conference. January29-30, Melbourne, Australia. pp.177\u2013184."},{"key":"CIT0006","unstructured":"Chee, Y. M. and Lim, A. A complex approach to the security of statistical databases subject to off-line sum queries. Proceedings of the IFIP TCIL Eighth International Conference on Information Security, IFIP\/Sec'92. Edited by: Gable, G. G. and Caelli, W. J. pp.373\u2013384."},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(84)90025-2"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.236161"},{"key":"CIT0009","first-page":"65","volume":"20","author":"Griggs J. R.","year":"1997","journal-title":"Bulletin of the ICA"},{"key":"CIT0010","first-page":"223","volume":"7","author":"Griggs J. R.","year":"1999","journal-title":"Bolyai Soc. Math. Stud"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(98)00122-X"},{"key":"CIT0012","first-page":"149","volume-title":"Databases in the 1990's","author":"Miller M.","year":"1990"}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160214651","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,14]],"date-time":"2016-12-14T06:00:56Z","timestamp":1481695256000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160214651"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,1]]},"references-count":12,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2002,1]]}},"alternative-id":["10.1080\/00207160214651"],"URL":"https:\/\/doi.org\/10.1080\/00207160214651","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,1]]}}}