{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:17:39Z","timestamp":1757611059484,"version":"3.44.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cicybs.2011.5949400","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:55:21Z","timestamp":1310558121000},"page":"31-38","source":"Crossref","is-referenced-by-count":11,"title":["A Hybrid of the prefix algorithm and the q-hidden algorithm for generating single negative databases"],"prefix":"10.1109","author":[{"given":"Ran","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, Anhui, China"}]},{"given":"Wenjian","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, Anhui, China"}]},{"given":"Xufa","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, University of Science and Technology of China, Hefei 230027, Anhui, China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQ.2007.4451016"},{"key":"ref11","first-page":"cs-07?001","article-title":"A Negative Authentication System","author":"dasgupta","year":"2007","journal-title":"Technical Report"},{"key":"ref12","first-page":"117","article-title":"An Investigation of Negative Authentication Systems","author":"dasgupta","year":"2008","journal-title":"Proc the ICIW 2008 The Third International Conference on i-Warfare & Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558654"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/EST.2010.37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88961-8_2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/800157.805047"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1090\/dimacs\/026\/25","article-title":"Local Search Strategies for Satisfiability Testing","volume":"26","author":"selman","year":"1995","journal-title":"DIMACS Series in Discrete Mathematics and Theoretical Computer Science"},{"key":"ref4","first-page":"667894a","article-title":"Enhancing Privacy through Negative Representations of Data","author":"esponda","year":"2004","journal-title":"Technical Report"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2008.919079"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30220-9_14"},{"key":"ref5","first-page":"384","article-title":"Generating Hard Satisfiable Formulas by Hiding Solutions Deceptively","author":"jia","year":"2005","journal-title":"proceedings of the Twentieth National Conference on Artificial Intelligence"},{"key":"ref8","first-page":"tr-cs-2007-18","article-title":"A Relational Algebra for Negative Databases","author":"esponda","year":"2007","journal-title":"Technical Report"},{"key":"ref7","first-page":"201","article-title":"Online Negative Databases (with Experimental Result)","volume":"1","author":"esponda","year":"2005","journal-title":"International Journal of Unconventional Computing"},{"article-title":"Negative Representations of Information","year":"2005","author":"esponda","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-007-0030-1"},{"key":"ref9","article-title":"Negative Surveys","author":"esponda","year":"2006","journal-title":"Arxiv &#x00B7; math\/0608176"}],"event":{"name":"2011 IEEE Symposium On Computational Intelligence In Cyber Security - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937004\/5949383\/05949400.pdf?arnumber=5949400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T17:50:14Z","timestamp":1756921814000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5949400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cicybs.2011.5949400","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}