{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:58:15Z","timestamp":1760425095830,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,6]]},"DOI":"10.1109\/fuzzy.2011.6007446","type":"proceedings-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T16:27:07Z","timestamp":1315844827000},"page":"2622-2629","source":"Crossref","is-referenced-by-count":11,"title":["Web user identification with fuzzy fingerprints"],"prefix":"10.1109","author":[{"given":"Nuno","family":"Homem","sequence":"first","affiliation":[]},{"given":"Joao Paulo","family":"Carvalho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"13"},{"key":"14","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1006\/jpdc.1997.1404","article-title":"Multilevel k-way partitioning scheme for irregular graphs","volume":"48","author":"karypis","year":"1998","journal-title":"J Parallel Distrib Comput"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"12","article-title":"Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression","author":"samarati","year":"1998","journal-title":"SRI International Technical Report"},{"key":"3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/3-540-47804-3_11","article-title":"Disclosure risk assessment in perturbative microdata protection","volume":"2316","author":"yancey","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"1","first-page":"111","article-title":"A quantitative comparison of disclosure control methods for microdata","author":"domingo-ferrer","year":"2001","journal-title":"Confidentiality Disclosure and Data Access Theory and Practical Applications for Statistical Agencies"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013847004932"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/69.979982"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"5","article-title":"Anonymizing social networks","author":"hay","year":"2007","journal-title":"Technical Report 07-19 University of Massachusetts Amherst"},{"journal-title":"Data Privacy for Simply Anonymized Social Network Logs Represented as Graphs","year":"0","author":"nettleton","key":"4"},{"key":"9","article-title":"Package 'sna'","author":"butts","year":"2011","journal-title":"REE project"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.07.006"}],"event":{"name":"2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)","start":{"date-parts":[[2011,6,27]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,6,30]]}},"container-title":["2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5976945\/6007305\/06007446.pdf?arnumber=6007446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T02:12:53Z","timestamp":1497924773000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6007446\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fuzzy.2011.6007446","relation":{},"subject":[],"published":{"date-parts":[[2011,6]]}}}