{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,3]],"date-time":"2025-04-03T17:06:27Z","timestamp":1743699987668,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-009"},{"start":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T00:00:00Z","timestamp":1610496000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,13]]},"DOI":"10.1109\/icoin50884.2021.9333939","type":"proceedings-article","created":{"date-parts":[[2021,2,3]],"date-time":"2021-02-03T15:42:57Z","timestamp":1612366977000},"page":"181-185","source":"Crossref","is-referenced-by-count":7,"title":["Cross Hashing: Anonymizing encounters in Decentralised Contact Tracing Protocols"],"prefix":"10.1109","author":[{"given":"Junade","family":"Ali","sequence":"first","affiliation":[]},{"given":"Vladimir","family":"Dyo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"e3322v1","article-title":"Mechanism for the prevention of password reuse through anonymized hashes","volume":"5","author":"ali","year":"2017","journal-title":"PeerJ PrePrints"},{"key":"ref11","first-page":"428","article-title":"Security analysis of the covid-19 contact tracing specifications by apple inc. and google inc","volume":"2020","author":"gvili","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354229"},{"key":"ref13","first-page":"1556","article-title":"Protecting accounts from credential stuffing with password breach alerting","author":"thomas","year":"2019","journal-title":"28th USENIX Security Symposium (USENIX Security 19)"},{"journal-title":"Pwned passwords padding (ft lava lamps and workers)","year":"2020","author":"ali","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5220\/0009825105720579"},{"key":"ref16","article-title":"Blebeacon: A real-subject trial dataset from mobile bluetooth low energy beacons","author":"sikeridis","year":"2018","journal-title":"arXiv preprint arXiv 1802 08908"},{"journal-title":"Contact Tracing Bluetooth Specification","year":"2020","key":"ref17"},{"key":"ref4","first-page":"399","article-title":"Analysis of dp3t","volume":"2020","author":"vaudenay","year":"2020","journal-title":"IACR Cryptol ePrint Arch"},{"journal-title":"Covid-19 apps pose serious human rights risks","year":"2020","key":"ref3"},{"key":"ref6","article-title":"Clinic-level variations in contact tracing outcomes: protocol for a cross-sectional study of variation and case-mix adjustment in london, uk","author":"lewer","year":"2019","journal-title":"UCL Collaborative Centre for Inclusion Health"},{"journal-title":"Contact tracing - cryptography specification","year":"2020","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1001\/jama.2020.6602"},{"key":"ref7","first-page":"1701","article-title":"Broken promises of privacy: Responding to the surprising failure of anonymization","volume":"57","author":"ohm","year":"2009","journal-title":"UCLA L Rev"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.abb6936"},{"key":"ref1","article-title":"Contact tracing mobile apps for covid-19: Privacy considerations and related trade-offs","author":"cho","year":"2020","journal-title":"arXiv preprint arXiv 2003 13874"},{"journal-title":"Robert&#x2019;s desired property is not clearly stated proposing &#x201D;k-anonymity&#x201D;","year":"2020","author":"dufour","key":"ref9"}],"event":{"name":"2021 International Conference on Information Networking (ICOIN)","start":{"date-parts":[[2021,1,13]]},"location":"Jeju Island, Korea (South)","end":{"date-parts":[[2021,1,16]]}},"container-title":["2021 International Conference on Information Networking (ICOIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9333828\/9333848\/09333939.pdf?arnumber=9333939","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:40:08Z","timestamp":1652197208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9333939\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,13]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icoin50884.2021.9333939","relation":{},"subject":[],"published":{"date-parts":[[2021,1,13]]}}}