{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:26:36Z","timestamp":1759091196455},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/pst.2012.6297913","type":"proceedings-article","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T16:45:25Z","timestamp":1347900325000},"page":"1-8","source":"Crossref","is-referenced-by-count":8,"title":["Single-party private web search"],"prefix":"10.1109","author":[{"given":"Alexandre","family":"Viejo","sequence":"first","affiliation":[]},{"given":"Jordi","family":"Castella-Roca","sequence":"additional","affiliation":[]},{"given":"Oriol","family":"Bernado","sequence":"additional","affiliation":[]},{"given":"Josep M.","family":"Mateo-Sanz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.05.009"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31909-9_15"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.11.003"},{"year":"2012","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458195"},{"key":"14","article-title":"A Face Is Exposed for AOL Searcher No. 4417749","author":"barbaro","year":"2006","journal-title":"The New York Times"},{"journal-title":"Noise Injection for Search Privacy Protection","year":"2008","author":"ye","key":"11"},{"journal-title":"Google Web History","year":"2012","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00069"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314351"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1108\/14684520910985693"},{"journal-title":"TrackMeNot","year":"2010","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242652"},{"journal-title":"AOL Search Data Mirrors","year":"2006","key":"25"},{"year":"2012","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655204"},{"key":"28","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-14527-8_2","article-title":"On the privacy of web search based on query obfuscation: A case study of TrackMeNot","author":"peddinti","year":"2010","journal-title":"Proc of the 10th International Conference on Privacy Enhancing Technologies PETS10"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148177"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1409220.1409222"},{"key":"10","article-title":"How unique is your web browser?","author":"eckersley","year":"0","journal-title":"Proc of the 10th International Conference on Privacy Enhancing Technologies - PETS'10 2010"},{"journal-title":"Google Privacy Policy","year":"2011","key":"1"},{"key":"30","article-title":"User kanonymity for privacy preserving data mining of query logs","author":"navarro-arribas","year":"0","journal-title":"Information Processing & Management"},{"key":"7","article-title":"Walking the Cyberbeat","author":"summers","year":"2009","journal-title":"Newsweek"},{"key":"6","article-title":"Increasingly, Internet's Data Trail Leads to Court","author":"hansell","year":"2006","journal-title":"The New York Times"},{"journal-title":"IProspect Blended Search Results Study","year":"2008","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775067"},{"journal-title":"Collusion Mozilla Add-on Discover Who's Tracking You Online","year":"2012","key":"9"},{"key":"8","article-title":"Yahoo Issues Takedown Notice for Spying Price List","author":"zetter","year":"2009","journal-title":"Wired"}],"event":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2012,7,16]]},"location":"Paris, France","end":{"date-parts":[[2012,7,18]]}},"container-title":["2012 Tenth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6287257\/6297910\/06297913.pdf?arnumber=6297913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T20:20:35Z","timestamp":1497990035000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6297913\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/pst.2012.6297913","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}