{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:43:07Z","timestamp":1773272587304,"version":"3.50.1"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100004100","name":"Labex PERSYVAL-LAB through the French Program Investissement d\u2019avenir","doi-asserted-by":"publisher","award":["ANR-11-LABX-0025-01"],"award-info":[{"award-number":["ANR-11-LABX-0025-01"]}],"id":[{"id":"10.13039\/501100004100","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/comst.2017.2747598","type":"journal-article","created":{"date-parts":[[2017,8,31]],"date-time":"2017-08-31T18:09:08Z","timestamp":1504202948000},"page":"551-565","source":"Crossref","is-referenced-by-count":21,"title":["The Pitfalls of Hashing for Privacy"],"prefix":"10.1109","volume":"20","author":[{"given":"Levent","family":"Demir","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2146-5400","authenticated-orcid":false,"given":"Amrit","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6987-2403","authenticated-orcid":false,"given":"Cedric","family":"Lauradoux","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1035"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6531"},{"key":"ref33","first-page":"1","article-title":"Anonymity, unobservability, and pseudonymity&#x2014;A proposal for terminology","volume":"2009","author":"pfitzmann","year":"2000","journal-title":"Proc Workshop on Design Issues in Anonymity and Unobservability"},{"key":"ref32","first-page":"1","article-title":"Cryptographic hash functions: Theory and practice","author":"preneel","year":"2010","journal-title":"Proc 12th Int Conf Inf Commun Security (ICICS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_1"},{"key":"ref30","first-page":"158","article-title":"The state of cryptographic hash functions","author":"preneel","year":"1998","journal-title":"Lectures on Data Security Modern Cryptology in Theory and Practice Summer School"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1007\/3-540-36467-6_4","article-title":"Towards an information theoretic metric for anonymity","volume":"2482","author":"serjantov","year":"2002","journal-title":"Proc Workshop Privacy Enhanc Technol (PET)"},{"key":"ref36","article-title":"Routing in random ad-hoc networks: Provably better than worst-case","author":"ercal-ozkaya","year":"2008"},{"key":"ref35","volume":"1","author":"feller","year":"1968","journal-title":"An Introduction to Probability Theory and Its Applications"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511814075"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33536-5_20"},{"key":"ref28","first-page":"428","article-title":"One way hash functions and DES","author":"merkle","year":"1989","journal-title":"Proc 9th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref64","first-page":"1","article-title":"Differential privacy","volume":"4052","author":"dwork","year":"2006","journal-title":"Proc 33rd Int Colloq Autom Lang Program Part II (ICALP)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0213-5"},{"key":"ref29","first-page":"416","article-title":"A design principle for hash functions","author":"damg\u00e5rd","year":"1989","journal-title":"Proc 9th Annu Int Cryptol Conf Adv Cryptol (CRYPTO)"},{"key":"ref2","year":"2010","journal-title":"Opinion 2\/2010 on Online Behavioral Advertising"},{"key":"ref1","year":"2014","journal-title":"Opinion 05\/2014 on Anonymisation Techniques"},{"key":"ref20","author":"chandra","year":"2007","journal-title":"CRAWDAD Dataset Microsoft\/Osdi2006 (v 2007-05-23) Traceset Pcap"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.39"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2611264.2611266"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-107r1"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1201\/CHDISMTHAPP"},{"key":"ref26","article-title":"SHA-3 standard: Permutation-based hash and extendable-output functions","year":"2014"},{"key":"ref25","article-title":"Secure hash standard (SHS)","year":"2012"},{"key":"ref50","year":"2015","journal-title":"Yandex Safe Browsing"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3986"},{"key":"ref59","first-page":"81","article-title":"A future-adaptable password scheme","author":"provos","year":"1999","journal-title":"Proc FREENIX Track USENIX Annu Tech Conf"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7914"},{"key":"ref57","year":"2013","journal-title":"DNS Census"},{"key":"ref56","year":"2015","journal-title":"Zeltser Security Corp"},{"key":"ref55","year":"2015","journal-title":"BigBlackList"},{"key":"ref54","year":"2015","journal-title":"Alexa 1M Global Sites"},{"key":"ref53","year":"2008","journal-title":"Google Inc"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1738"},{"key":"ref10","author":"bongard","year":"2013","journal-title":"De-Anonymizing Users of French Political Forums"},{"key":"ref11","year":"2006","journal-title":"A Face is Exposed for AOL Searcher no 4417749"},{"key":"ref40","year":"2016","journal-title":"VeriSign Inc"},{"key":"ref12","year":"2017","journal-title":"EyeQ Privacy Policy"},{"key":"ref13","year":"2013","journal-title":"Mobile Location Analytics Code of Conduct"},{"key":"ref14","year":"2014","journal-title":"BPJM Modul"},{"key":"ref15","author":"higgins","year":"2013","journal-title":"Mobile Racking Code of Conduct Falls Short of Protecting Consumers"},{"key":"ref16","author":"soltani","year":"2015","journal-title":"Privacy Trade-Offs in Retail Tracking"},{"key":"ref17","author":"mayer","year":"2014","journal-title":"Questionable Crypto in Retail Analytics"},{"key":"ref18","author":"bouchenard","year":"2015","journal-title":"JC Decaux&#x2019;s Pedestrian Tracking System Blocked by French Data Regulator"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255113"},{"key":"ref4","year":"2006","journal-title":"Privacy Technology Focus Group Final Report and Recommendations"},{"key":"ref3","year":"2011","journal-title":"Opinion 16\/2011 on EASA\/IAB Best Practice Recommendation on Online Behavioural Advertising"},{"key":"ref6","author":"goodin","year":"2014","journal-title":"Poorly Anonymized Logs Reveal NYC Cab Drivers&#x2019; Detailed Whereabouts"},{"key":"ref5","year":"2002","journal-title":"Directive Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector"},{"key":"ref8","year":"2015","journal-title":"Euclid Analytics&#x2014;Privacy Statement"},{"key":"ref7","author":"preston-werner","year":"2007","journal-title":"Gravatar"},{"key":"ref49","year":"2015","journal-title":"IEEE"},{"key":"ref9","year":"2016","journal-title":"Safe Browsing api"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426685"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2627393.2627399"},{"key":"ref48","first-page":"15","article-title":"The new retail experience and its unaddressed privacy concerns: How RFID and mobile location analytics are collecting customer information","volume":"7","author":"farshidi","year":"2016","journal-title":"Journal of Law Technology & the Internet"},{"key":"ref47","author":"fung","year":"2013","journal-title":"How Stores Use Your Phone&#x2019;s WiFi to Track Your Shopping Habits"},{"key":"ref42","author":"steube","year":"2016","journal-title":"Hashcat Advanced Password Recovery"},{"key":"ref41","year":"2015","journal-title":"Email Statistics Report 2015&#x2013;2019"},{"key":"ref44","year":"2017","journal-title":"Opinion 01\/2017 on the Proposed Regulation for the ePrivacy Regulation"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8302422\/08023740.pdf?arnumber=8023740","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:59Z","timestamp":1642004579000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8023740\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":64,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2747598","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}