{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T16:11:30Z","timestamp":1742400690435,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/icde.2008.4497482","type":"proceedings-article","created":{"date-parts":[[2008,4,29]],"date-time":"2008-04-29T15:04:39Z","timestamp":1209481479000},"page":"735-743","source":"Crossref","is-referenced-by-count":37,"title":["Similar Document Detection with Limited Information Disclosure"],"prefix":"10.1109","author":[{"given":"Wei","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Mummoorthy","family":"Murugesan","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[]},{"given":"Luo","family":"Si","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"104","article-title":"on secure scalar product computation for privacy-preserving data mining","author":"goethals","year":"2004","journal-title":"The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"journal-title":"Modern Information Retrieval","year":"1999","author":"baeza-yates","key":"17"},{"journal-title":"Lemur toolkit for language modeling and information retrieval","year":"0","key":"23"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"15","first-page":"777","volume":"20","author":"ahituv","year":"1987","journal-title":"Processing encrypted data"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/226931.226961"},{"key":"14","first-page":"965","volume":"45","author":"chor","year":"1998","journal-title":"Private information retrieval"},{"key":"11","first-page":"508","article-title":"splat: a system for self-plagiarism detection","author":"collberg","year":"2003","journal-title":"Proceedings of IADIS International Conference WWW\/INTERNET 2003"},{"key":"12","first-page":"110","article-title":"compact features for detection of near-duplicates in distributed retrieval","author":"bernstein","year":"2006","journal-title":"SPIRE"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.126"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872770"},{"journal-title":"Finding similar files in a large file system","year":"1993","author":"manber","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/331697.335176"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"6","article-title":"mclean students sue anti-cheating service: plaintiffs say company's database of term papers, essays violates copyright laws","author":"glod","year":"2007","journal-title":"The Washington Post"},{"key":"5","article-title":"scam: a copy detection mechanism for digital documents","author":"shivakumar","year":"1995","journal-title":"Proceedings of the 2nd International Conference in Theory and Practice of Digital Libraries (DL'95)"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148243"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223855"},{"key":"8","first-page":"21","article-title":"on the resemblance and containment of documents","author":"broder","year":"1997","journal-title":"Compression and Complexity of Sequences"}],"event":{"name":"2008 IEEE 24th International Conference on Data Engineering (ICDE 2008)","start":{"date-parts":[[2008,4,7]]},"location":"Cancun, Mexico","end":{"date-parts":[[2008,4,12]]}},"container-title":["2008 IEEE 24th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4492792\/4497384\/04497482.pdf?arnumber=4497482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T11:12:11Z","timestamp":1489662731000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4497482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icde.2008.4497482","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}