{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:34:53Z","timestamp":1729668893530,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596036","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"51-60","source":"Crossref","is-referenced-by-count":1,"title":["Blend me in: Privacy-preserving input generalization for personalized online services"],"prefix":"10.1109","author":[{"given":"Alegria","family":"Baquero","sequence":"first","affiliation":[]},{"given":"Allan M.","family":"Schiffman","sequence":"additional","affiliation":[]},{"given":"Jeff","family":"Shrager","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242652"},{"year":"0","key":"35"},{"key":"17","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/11428572_10","article-title":"A formal model of obfuscation and negotiation for location privacy","author":"duckham","year":"2005","journal-title":"Pervasive Computing"},{"year":"0","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-008-0212-5"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2005.48"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557079"},{"year":"0","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.77"},{"journal-title":"Data Swapping Variations on A Theme by Dalenius and Reiss","year":"2004","author":"fienberg","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401904"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367858"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","author":"aggarwal","year":"2008","journal-title":"A General Survey of Privacy-Preserving Data Mining Models and Algorithms"},{"key":"21","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1613\/jair.3089","article-title":"A utility-theoretic approach to privacy in online services","volume":"39","author":"krause","year":"2010","journal-title":"Journal of Artificial Intelligence Research"},{"key":"20","article-title":"Knowledgebased scheme to create privacy-preserving but semanticallyrelated queries for web search engines","author":"s?anchez","year":"2012","journal-title":"Information Sciences"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28879-1_4"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250993"},{"key":"24","first-page":"180","article-title":"Anonymizing social networks","author":"hay","year":"2007","journal-title":"Computer Science Department Faculty Publication Series"},{"key":"25","first-page":"417","article-title":"Trackmenot: Resisting surveillance in web search","author":"howe","year":"2009","journal-title":"Lessons from the Identity Trail Anonymity Privacy and Identity in a Networked Society"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"27","first-page":"29","article-title":"An identity-based key-exchange protocol","volume":"89","author":"gunther","year":"1989","journal-title":"Advances in Cryptology Proc Of EUROCRYPT"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"29","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/978-3-540-25955-8_12","article-title":"On the security of noise addition for privacy in statistical databases","author":"domingo-ferrer","year":"2004","journal-title":"Privacy in Statistical Databases Springer"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1743546.1743558"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1145\/772862.772864","article-title":"The inference problem: A survey","author":"farkas","year":"2002","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00328.x"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth921"},{"key":"7","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-540-30576-7_20","article-title":"Toward privacy in public databases","author":"chawla","year":"2005","journal-title":"Theory of Cryptography"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1278201.1278202"},{"key":"32","article-title":"Comparing top k lists","volume":"1","author":"fagin","year":"2003","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"5","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/1-4020-2148-8_5","article-title":"I didnt buy it for myself","author":"cranor","year":"2004","journal-title":"Designing Personalized User Experiences in eCommerce"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.4.327"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367856"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596036.pdf?arnumber=6596036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,24]],"date-time":"2019-07-24T07:21:22Z","timestamp":1563952882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596036","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}