{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:01Z","timestamp":1761401281738,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102199.1102212","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"55-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Quantitative evaluation of unlinkable ID matching schemes"],"prefix":"10.1145","author":[{"given":"Yasunobu","family":"Nohara","sequence":"first","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Sozo","family":"Inoue","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Kensuke","family":"Baba","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"given":"Hiroto","family":"Yasuura","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"201","volume-title":"International Conference on Security in Pervasive Computing 2003","author":"Weis Stephan A.","year":"2004","unstructured":"Stephan A. Weis , Sanjay E. Sarma , Ronald L. Rivest , and Daniel W . Engels, \"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems \", International Conference on Security in Pervasive Computing 2003 , LNCS 2802, pp. 201 -- 212 , 2004 .]] Stephan A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, \"Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems\", International Conference on Security in Pervasive Computing 2003, LNCS 2802, pp.201--212, 2004.]]"},{"key":"e_1_3_2_1_2_1","volume-title":"RFID Privacy Workshop@MIT","author":"Ohkubo Miyako","year":"2003","unstructured":"Miyako Ohkubo , Koutarou Suzuki and Shingo Kinoshita , \"Cryptographic Approach to a Privacy Friendly Tag \", RFID Privacy Workshop@MIT , 2003 .]] Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, \"Cryptographic Approach to a Privacy Friendly Tag\", RFID Privacy Workshop@MIT, 2003.]]"},{"key":"e_1_3_2_1_3_1","first-page":"719","volume-title":"Proc. of the 2004 Symposium on Cryptography and Information Security(SCIS2004)","volume":"1","author":"Ohkubo Miyako","year":"2004","unstructured":"Miyako Ohkubo , Koutarou Suzuki , Shingo Kinoshita , \" Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID\" , Proc. of the 2004 Symposium on Cryptography and Information Security(SCIS2004) , Vol. 1 , pp. 719 -- 724 , Jan. 2004 .]] Miyako Ohkubo, Koutarou Suzuki, Shingo Kinoshita, \"Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID\", Proc. of the 2004 Symposium on Cryptography and Information Security(SCIS2004), Vol.1, pp.719--724, Jan. 2004.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"International Workshop on Design Issues in Anonymity and Unobservability, LNCS2009","author":"Pfitzmann Andreas","year":"2000","unstructured":"Andreas Pfitzmann and Marit K\u00f6hntopp , \"Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology\" , International Workshop on Design Issues in Anonymity and Unobservability, LNCS2009 , pp. 1 -- 9 , 2000 .]] Andreas Pfitzmann and Marit K\u00f6hntopp, \"Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology\", International Workshop on Design Issues in Anonymity and Unobservability, LNCS2009, pp.1--9, 2000.]]"},{"key":"e_1_3_2_1_6_1","first-page":"54","volume-title":"Workshop on Privacy Enhancing Technologies 2002","author":"D\u00edaz Claudia","year":"2002","unstructured":"Claudia D\u00edaz , Stefaan Seys , Joris Claessens , and Bart Preneel , \" Towards measuring anonymity\" , Workshop on Privacy Enhancing Technologies 2002 , LNCS 2482, pp. 54 -- 68 , 2002 .]] Claudia D\u00edaz, Stefaan Seys, Joris Claessens, and Bart Preneel, \"Towards measuring anonymity\", Workshop on Privacy Enhancing Technologies 2002, LNCS 2482, pp. 54--68, 2002.]]"},{"key":"e_1_3_2_1_7_1","first-page":"41","volume-title":"Workshop on Privacy Enhancing Technologies 2002","author":"Serjantov Andrei","year":"2002","unstructured":"Andrei Serjantov and George Danezis , \" Towards an Information Theoretic Metric for Anonymity\" , Workshop on Privacy Enhancing Technologies 2002 , LNCS 2482, pp. 41 -- 53 , 2002 .]] Andrei Serjantov and George Danezis, \"Towards an Information Theoretic Metric for Anonymity\", Workshop on Privacy Enhancing Technologies 2002, LNCS 2482, pp. 41--53, 2002.]]"},{"key":"e_1_3_2_1_8_1","first-page":"179","volume-title":"Proceedings of the 23rd Symposium on Information Theory","author":"D\u00edaz Claudia","year":"2002","unstructured":"Claudia D\u00edaz , Joris Claessens , Stefaan Seys , and Bart Preneel , \" Information Theory and Anonymity\" , Proceedings of the 23rd Symposium on Information Theory , pp. 179 -- 186 , May . 2002 .]] Claudia D\u00edaz, Joris Claessens, Stefaan Seys, and Bart Preneel, \"Information Theory and Anonymity\", Proceedings of the 23rd Symposium on Information Theory, pp. 179--186, May. 2002.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40956-4_3"},{"key":"e_1_3_2_1_10_1","first-page":"1567","volume-title":"Proc. of the 2005 Symposium on Cryptography and Information Security (SCIS2005)","volume":"3","author":"Nohara Yasunobu","year":"2005","unstructured":"Yasunobu Nohara , Sozo Inoue , Kensuke Baba , and Hiroto Yasuura , \" Unlinkable ID Matching Protocol for Large-scale RFID Systems\" , Proc. of the 2005 Symposium on Cryptography and Information Security (SCIS2005) , Vol. 3 , pp. 1567 -- 1572 , Jan. 2005 . (in Japanese)]] Yasunobu Nohara, Sozo Inoue, Kensuke Baba, and Hiroto Yasuura, \"Unlinkable ID Matching Protocol for Large-scale RFID Systems\", Proc. of the 2005 Symposium on Cryptography and Information Security (SCIS2005), Vol.3, pp.1567--1572, Jan. 2005. (in Japanese)]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 ACM workshop on Privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102199.1102212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102199.1102212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:08Z","timestamp":1750262888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102199.1102212"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":11,"alternative-id":["10.1145\/1102199.1102212","10.1145\/1102199"],"URL":"https:\/\/doi.org\/10.1145\/1102199.1102212","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}