{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T16:24:45Z","timestamp":1772295885503,"version":"3.50.1"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["SFI\/11\/PI\/1177"],"award-info":[{"award-number":["SFI\/11\/PI\/1177"]}],"id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1109\/tifs.2017.2718487","type":"journal-article","created":{"date-parts":[[2017,7,3]],"date-time":"2017-07-03T18:08:30Z","timestamp":1499105310000},"page":"2726-2735","source":"Crossref","is-referenced-by-count":54,"title":["Optimal Differentially Private Mechanisms for Randomised Response"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2222-9394","authenticated-orcid":false,"given":"Naoise","family":"Holohan","sequence":"first","affiliation":[]},{"given":"Douglas J.","family":"Leith","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"Mason","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2425831"},{"key":"ref32","article-title":"The optimal mechanism in ( $\\epsilon, \\delta$ )-differential privacy","volume":"abs 1305 1330","author":"geng","year":"2013","journal-title":"CoRR"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875258"},{"key":"ref30","first-page":"143","author":"karwa","year":"2014","journal-title":"Differentially Private 852 Exponential Random Graphs"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2016.04.010"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.01.021"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/10361140500302472"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1971.10482320"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/77.2.439"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/j.2517-6161.1994.tb01962.x","article-title":"An improved randomized response strategy","volume":"56","author":"mangat","year":"1994","journal-title":"J Roy Statist Soc Ser B Stat Methodol"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-011-9640-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2015.1050028"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0049124100028004005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10480307"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0049124103262685"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2012.05.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/2094978"},{"key":"ref28","first-page":"2879","article-title":"Extremal mechanisms for local differential privacy","volume":"27","author":"kairouz","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1207\/S15327043HUP1601_4"},{"key":"ref27","author":"kairouz","year":"2013","journal-title":"The Composition Theorem for Differential Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/phar.1166"},{"key":"ref6","first-page":"416","article-title":"The randomized response technique application in the survey of homo-sexual commercial sex among men in Beijing","volume":"43","author":"chen","year":"2014","journal-title":"Iranian Jour Publ Health"},{"key":"ref29","author":"holohan","year":"2016","journal-title":"Extreme points of the local differential privacy polytope"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/pan\/mpq010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1969.10500991"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1988.tb42063.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.drugalcdep.2009.07.026"},{"key":"ref9","first-page":"308","article-title":"Assuring confidentiality of responses in social research: A note on strategies","volume":"6","author":"boruch","year":"1971","journal-title":"Amer Sociol"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1994.75.3f.1531"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.19030\/jabr.v13i3.5749"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1177\/0049124113500474"},{"key":"ref24","first-page":"1","article-title":"Differential privacy","author":"dwork","year":"2006","journal-title":"Automata Languages and Programming"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1177\/0049124110390768"},{"key":"ref26","article-title":"Using randomized response for differential privacy preserving data collection","author":"wang","year":"2014"},{"key":"ref25","author":"dwork","year":"2016","journal-title":"Concentrated differential privacy"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7990663\/07967624.pdf?arnumber=7967624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T05:59:07Z","timestamp":1719295147000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7967624\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":36,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2017.2718487","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}