{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:50:21Z","timestamp":1750308621085,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,28]],"date-time":"2013-10-28T00:00:00Z","timestamp":1382918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Lebanese CNRS Research Grant Program NCSR project 506","award":["1003"],"award-info":[{"award-number":["1003"]}]},{"name":"CEDRE research collaboration program","award":["project AO 2011"],"award-info":[{"award-number":["project AO 2011"]}]},{"DOI":"10.13039\/501100004794","name":"Centre National de la Recherche Scientifique","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004794","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,28]]},"DOI":"10.1145\/2536146.2536161","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T14:14:02Z","timestamp":1385561642000},"page":"68-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["<i>de<\/i>\n            -linkability"],"prefix":"10.1145","author":[{"given":"Bechara","family":"Al Bouna","sequence":"first","affiliation":[{"name":"Antonine University, Baabda, Lebanon"}]},{"given":"Eliana J.","family":"Raad","sequence":"additional","affiliation":[{"name":"Bourgogne University, Dijon, France"}]},{"given":"Charbel","family":"Elia","sequence":"additional","affiliation":[{"name":"Antonine University, Baabda, Lebanon"}]},{"given":"Richard","family":"Chbeir","sequence":"additional","affiliation":[{"name":"University of Pau and Adour, Countries, Pau, France"}]},{"given":"Ramzi","family":"Haraty","sequence":"additional","affiliation":[{"name":"Lebanese American University, Beirut, Lebanon"}]}],"member":"320","published-online":{"date-parts":[[2013,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"User Modeling, Adaption and Personalization","author":"Abel F.","year":"2011","unstructured":"F. Abel , Q. Gao , G.-J. Houben , and K. Tao . Analyzing user modeling on twitter for personalized news recommendations . In J. Konstan, R. Conejo, J. Marzo, and N. Oliver, editors, User Modeling, Adaption and Personalization , volume 6787 of Lecture Notes in Computer Science , pages 1 -- 12 . Springer Berlin Heidelberg , 2011 . F. Abel, Q. Gao, G.-J. Houben, and K. Tao. Analyzing user modeling on twitter for personalized news recommendations. In J. Konstan, R. Conejo, J. Marzo, and N. Oliver, editors, User Modeling, Adaption and Personalization, volume 6787 of Lecture Notes in Computer Science, pages 1--12. Springer Berlin Heidelberg, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1314418.1314435"},{"key":"e_1_3_2_1_3_1","first-page":"345","volume-title":"SECRYPT","author":"Bouna B. A.","year":"2011","unstructured":"B. A. Bouna , R. Chbeir , and A. Gabillon . The image protector - a flexible security rule specification toolkit . In SECRYPT , pages 345 -- 350 , 2011 . B. A. Bouna, R. Chbeir, and A. Gabillon. The image protector - a flexible security rule specification toolkit. In SECRYPT, pages 345--350, 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1145\/358916.358935"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/1458082.1458194"},{"key":"e_1_3_2_1_6_1","first-page":"930","volume-title":"IEEE SMC '99 Conference Proceedings. 1999 IEEE International Conference on","volume":"2","author":"Chun B. T.","year":"1999","unstructured":"B. T. Chun , Y. Bae , and T.-Y. Kim . A method for original image recovery for caption areas in video. In Systems, Man, and Cybernetics, 1999 . IEEE SMC '99 Conference Proceedings. 1999 IEEE International Conference on , volume 2 , pages 930 -- 935 , 1999 . B. T. Chun, Y. Bae, and T.-Y. Kim. A method for original image recovery for caption areas in video. In Systems, Man, and Cybernetics, 1999. IEEE SMC '99 Conference Proceedings. 1999 IEEE International Conference on, volume 2, pages 930--935, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TIP.2004.833105"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/11787006_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1145\/1099554.1099711"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.5555\/2035420.2035440"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/EC2ND.2011.21"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.5555\/3120676.3120732"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/CVPR.2006.141"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/ICDE.2007.367856"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/2095536.2095577"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICDE.2006.1"},{"key":"e_1_3_2_1_18_1","volume-title":"Mathematical theory of entropy","author":"Martin N. F.","year":"2011","unstructured":"N. F. Martin and J. W. England . Mathematical theory of entropy , volume 12 . Cambridge University Press , 2011 . N. F. Martin and J. W. England. Mathematical theory of entropy, volume 12. Cambridge University Press, 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the International Workshop on Personalization on the Semantic Web (PersWeb05)","author":"Mori J.","year":"2005","unstructured":"J. Mori , Y. Matsuo , and M. Ishizuka . Finding user semantics on the web using word co-occurrence information . In Proceedings of the International Workshop on Personalization on the Semantic Web (PersWeb05) , 2005 . J. Mori, Y. Matsuo, and M. Ishizuka. Finding user semantics on the web using word co-occurrence information. In Proceedings of the International Workshop on Personalization on the Semantic Web (PersWeb05), 2005."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1007\/978-3-642-33627-0_24"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/TIP.2006.888343"},{"key":"e_1_3_2_1_22_1","volume-title":"Numerical Recipes","author":"Press W. H.","year":"2007","unstructured":"W. H. Press , S. A. Teukolsky , W. T. Vetterling , and B. P. Flannery . Numerical Recipes 3 rd Edition: The Art of Scientific Computing. Cambridge University Press , New York, NY, USA, 3 edition, 2007 . W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes 3rd Edition: The Art of Scientific Computing. Cambridge University Press, New York, NY, USA, 3 edition, 2007.","edition":"3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/69.971193"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.5555\/1362903.1362909"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1142\/S021848850200165X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/CVPR.2008.4587704"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/TPAMI.2007.60"}],"event":{"sponsor":["LBBC Luxembourg Brazil Business Council","IPv6 Luxembourg Council Luxembourg IPv6 Council","Luxembourg Green Business Awards 2013 Luxembourg Green Business Awards 2013","LUXINNOVATION Agence Nationale pour la Promotion de l Innovation et de la Recherche","Pro Newtech Pro Newtech","CTI Centro de Tecnologia da Informa\u00e7\u00e3o Renato Archer","SIGAPP ACM Special Interest Group on Applied Computing"],"acronym":"MEDES '13","name":"MEDES '13: Fifth International Conference on Management of Emergent Digital EcoSystems","location":"Luxembourg Luxembourg"},"container-title":["Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2536146.2536161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2536146.2536161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:40Z","timestamp":1750273660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2536146.2536161"}},"subtitle":["a privacy-preserving constraint for safely outsourcing multimedia documents"],"short-title":[],"issued":{"date-parts":[[2013,10,28]]},"references-count":27,"alternative-id":["10.1145\/2536146.2536161","10.1145\/2536146"],"URL":"https:\/\/doi.org\/10.1145\/2536146.2536161","relation":{},"subject":[],"published":{"date-parts":[[2013,10,28]]},"assertion":[{"value":"2013-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}