{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:24:32Z","timestamp":1730291072482,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/pst.2011.5971958","type":"proceedings-article","created":{"date-parts":[[2011,8,15]],"date-time":"2011-08-15T20:33:42Z","timestamp":1313440422000},"page":"16-23","source":"Crossref","is-referenced-by-count":0,"title":["Safe realization of the Generalization privacy mechanism"],"prefix":"10.1109","author":[{"given":"Tristan","family":"Allard","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Philippe","family":"Pucheral","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807328"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref13","article-title":"CSI\/FBI Computer Crime and Security Survey","author":"gordon","year":"2006","journal-title":"Technical Report"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066164"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1631\/jzus.A0820320"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.1"},{"key":"ref17","first-page":"420","volume":"33","author":"ren","year":"2010","journal-title":"Survey on anonymous communications in computer networks Comput Commun"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"year":"2008","key":"ref4"},{"year":"2007","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920850"},{"year":"2009","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21031-0_25"},{"key":"ref7","article-title":"Safe anonymization of data hosted in smart tokens","author":"allard","year":"2010","journal-title":"Technical Report 2010\/25"},{"year":"2002","key":"ref2"},{"year":"1995","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2011.43"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref22","volume":"179","author":"zhong","year":"2009","journal-title":"k-anonymous data collection Inf Sci"},{"key":"ref21","article-title":"Distributed privacy preserving information sharing","author":"zhang","year":"2005","journal-title":"VLDB"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065185"}],"event":{"name":"2011 Ninth Annual International Conference on Privacy, Security and Trust","start":{"date-parts":[[2011,7,19]]},"location":"Montreal, QC","end":{"date-parts":[[2011,7,21]]}},"container-title":["2011 Ninth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5961997\/5971950\/05971958.pdf?arnumber=5971958","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T02:44:29Z","timestamp":1490064269000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5971958\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/pst.2011.5971958","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}