{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:06Z","timestamp":1750220886944,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371682","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"34-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Mobile Phone Number Privacy Scheme Based on Lightweight Hash Mapping"],"prefix":"10.1145","author":[{"given":"Qingqing","family":"Chang","sequence":"first","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC"}]},{"given":"Shenghui","family":"Su","sequence":"additional","affiliation":[{"name":"College of Computer Science &amp; Technology, Nanjing Univ. of Aeronautics &amp; Astronautics, Nanjing, PRC and Public Security Innovation Center, Nanjing Univ. of Science &amp; Technology, Nanjing, PRC"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Chou Z. 2014. Alipay ' Inner Ghost' Leak Economic Observer.  Chou Z. 2014. Alipay ' Inner Ghost' Leak Economic Observer."},{"key":"e_1_3_2_1_2_1","unstructured":"Qi G. 2017. Deciphering How 5 Billion Personal Information Was Stolen: Jingdong Appeared Inner Ghost CCTV .  Qi G. 2017. Deciphering How 5 Billion Personal Information Was Stolen: Jingdong Appeared Inner Ghost CCTV ."},{"key":"e_1_3_2_1_3_1","volume-title":"Data Leakage","author":"An B.","year":"2018","unstructured":"An B. 2018. Data Leakage in 2018 , Sina Science and Technology Network . An B. 2018. Data Leakage in 2018, Sina Science and Technology Network."},{"volume-title":"Introduction to mobile call flow","key":"e_1_3_2_1_4_1","unstructured":"2007. Introduction to mobile call flow , Hebei Mobile Communications Co., Ltd. 2007. Introduction to mobile call flow, Hebei Mobile Communications Co., Ltd."},{"key":"e_1_3_2_1_6_1","first-page":"2","article-title":"Principle, Implementation and Application of One-Way Hash Function","volume":"19","author":"Xin Y.","year":"2002","unstructured":"Xin , Y. , Liao , D. , and Lu , G. 2002 . Principle, Implementation and Application of One-Way Hash Function . Computer Application Research. 19 , 2 (Apr.2002). 25--27. Xin, Y., Liao, D., and Lu, G. 2002. Principle, Implementation and Application of One-Way Hash Function. Computer Application Research. 19, 2 (Apr.2002). 25--27.","journal-title":"Computer Application Research."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Su S. Xie T. and L\u00fc S. 2016. A provably secure non-iterative hash function resisting birthday attack. Theoretical Computer Science. 654(Nov.2016) 128--142.  Su S. Xie T. and L\u00fc S. 2016. A provably secure non-iterative hash function resisting birthday attack. Theoretical Computer Science. 654(Nov.2016) 128--142.","DOI":"10.1016\/j.tcs.2016.02.023"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Su S. L\u00fc S. 2012. A public key cryptosystem based on three new provable problems. Theoretical Computer Science. 426 (Apr.2012) 91--117.  Su S. L\u00fc S. 2012. A public key cryptosystem based on three new provable problems. Theoretical Computer Science. 426 (Apr.2012) 91--117.","DOI":"10.1016\/j.tcs.2011.12.011"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_32"},{"key":"e_1_3_2_1_10_1","volume-title":"Annual Cryptology Conference (Nov.","author":"Guo J.","year":"2011","unstructured":"Guo , J. , Peyrin , T. , and Poschmann , A . 2011. The PHOTON family of lightweight hash functions . In Annual Cryptology Conference (Nov. 2011 ), 222--239. Springer, Berlin, Heidelberg. Guo, J., Peyrin, T., and Poschmann, A. 2011. The PHOTON family of lightweight hash functions. In Annual Cryptology Conference (Nov. 2011), 222--239. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_11_1","volume-title":"Database encryption. Encyclopedia of cryptography and security (Mar","author":"Bouganim L.","year":"2003","unstructured":"Bouganim , L. , Guo , Y. 2011. Database encryption. Encyclopedia of cryptography and security (Mar . 2003 ), 307--312. Bouganim, L., Guo, Y. 2011. Database encryption. Encyclopedia of cryptography and security (Mar. 2003), 307--312."},{"key":"e_1_3_2_1_12_1","article-title":"Based on three-level database encryption application system","author":"Chen T.","year":"2005","unstructured":"Chen , T. , Chen , H. , and Liu , Y. 2005 . Based on three-level database encryption application system . Journal of Huazhong University of Science and Technology: Natural Science Edition. 7 ( May .2005), 41--43. Chen, T., Chen, H., and Liu, Y. 2005. Based on three-level database encryption application system. Journal of Huazhong University of Science and Technology: Natural Science Edition. 7 (May.2005), 41--43.","journal-title":"Journal of Huazhong University of Science and Technology: Natural Science Edition. 7"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371682","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371682","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:23Z","timestamp":1750203863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371682"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":11,"alternative-id":["10.1145\/3371676.3371682","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371682","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}