{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:02:15Z","timestamp":1742637735226,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/wifs.2014.7084303","type":"proceedings-article","created":{"date-parts":[[2015,4,22]],"date-time":"2015-04-22T16:32:15Z","timestamp":1429720335000},"page":"54-59","source":"Crossref","is-referenced-by-count":13,"title":["State estimation using an extended Kalman filter with privacy-protected observed inputs"],"prefix":"10.1109","author":[{"given":"Francisco J.","family":"Gonzalez-Serrano","sequence":"first","affiliation":[]},{"given":"Adrian","family":"Amor-Mart\u0131n","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Casamayon-Anton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-14577-3_6","article-title":"Secure computation with fixed-point numbers","author":"catrina","year":"2010","journal-title":"Financial Cryptography and Data Security"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/ARITH.2003.1207675","article-title":"A parametric error analysis of Goldschmidt's division algorithm","author":"even","year":"2003","journal-title":"Computer Arithmetic 2003 Proceedings 16th IEEE Symposium on"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"article-title":"Estimation with applications to tracking and navigation: theory algorithms and software","year":"2004","author":"bar-shalom","key":"ref13"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"5","DOI":"10.29012\/jpc.v1i1.566","article-title":"Secure multiparty computation for privacy-preserving data mining","volume":"1","author":"lindell","year":"2009","journal-title":"Journal of Privacy and Confidentiality"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"article-title":"Foundations of Cryptography II","year":"2004","author":"goldreich","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"ref8","first-page":"235","article-title":"Privacy-preserving face recognition","volume":"5672","author":"erkin","year":"2009","journal-title":"9th International Symposium Privacy Enhancing Technologies - PETS 2009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2109385"},{"key":"ref1","volume":"30","author":"signal","year":"2013","journal-title":"Proceedings Magazine"},{"key":"ref9","article-title":"Comparing encrypted data","author":"veugen","year":"2011","journal-title":"Multimedia Signal Processing Group Delft University of Technology the Netherlands and TNO Information and Communication Technology Delft Tech Rep"}],"event":{"name":"2014 IEEE International Workshop on Information Forensics and Security (WIFS)","start":{"date-parts":[[2014,12,3]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2014,12,5]]}},"container-title":["2014 IEEE International Workshop on Information Forensics and Security (WIFS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7070475\/7084286\/07084303.pdf?arnumber=7084303","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T19:53:44Z","timestamp":1566590024000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7084303\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/wifs.2014.7084303","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}