{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:02Z","timestamp":1750220642716,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,18]]},"DOI":"10.1145\/3424954.3424955","type":"proceedings-article","created":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T19:47:00Z","timestamp":1610480820000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Warning Management for an Identity Leakage Warning Network"],"prefix":"10.1145","author":[{"given":"Saffija","family":"Kasem-Madani","sequence":"first","affiliation":[{"name":"University of Bonn"}]},{"given":"Timo","family":"Malderle","sequence":"additional","affiliation":[{"name":"University of Bonn"}]},{"given":"Felix","family":"Boes","sequence":"additional","affiliation":[{"name":"University of Bonn"}]},{"given":"Michael","family":"Meier","sequence":"additional","affiliation":[{"name":"University of Bonn, Fraunhofer FKIE"}]}],"member":"320","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"volume-title":"Privacy-Enhanced Fraud Detection with Bloom Filters. In International Conference on Security and Privacy in Communication Systems. Springer, 396--415","year":"2018","author":"Arp Daniel","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131391"},{"volume-title":"Official Journal of the European Union L119\/59 (4","year":"2016","author":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation).","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63-3"},{"volume-title":"Automated Parsing and Interpretation of Identity Leaks. 9551","year":"2016","author":"Graupner Hendrik","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196514"},{"key":"e_1_3_2_1_8_1","unstructured":"Hasso-Plattner-Institut. 2020. Wurden Ihre Identit\u00e4tsdaten ausspioniert? https:\/\/sec.hpi.de\/ilc Last visited: 11.02.2020.  Hasso-Plattner-Institut. 2020. Wurden Ihre Identit\u00e4tsdaten ausspioniert? https:\/\/sec.hpi.de\/ilc Last visited: 11.02.2020."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60876-1_16"},{"key":"e_1_3_2_1_10_1","unstructured":"Troy Hunt. 2020. ';-have i been pwned? https:\/\/haveibeenpwned.com\/ Last visited: 11.02.2020.  Troy Hunt. 2020. ';-have i been pwned? https:\/\/haveibeenpwned.com\/ Last visited: 11.02.2020."},{"volume-title":"Proceedings of the 11th International Conference on Passwords (PASSWORDS2016)","year":"2016","author":"Jaeger David","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"Alison Grace Johansen. 2018. 4 Lasting Effects of Identity Theft. https:\/\/www.lifelock.com\/education\/4-lasting-effects-of-identity-theft\/ Last visited:11.02.2020.  Alison Grace Johansen. 2018. 4 Lasting Effects of Identity Theft. https:\/\/www.lifelock.com\/education\/4-lasting-effects-of-identity-theft\/ Last visited:11.02.2020."},{"volume-title":"ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy, Steven Furnell, Paolo Mori, Edgar Weippl, and Oliver Champ (Eds.).","author":"Malderle Timo","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17065-3_28"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3203217.3203269"},{"key":"e_1_3_2_1_16_1","unstructured":"David McCandless Tom Evans Paul Barton Stephanie Starling and Ducan Geere. 2020. World's Biggest Data Breaches & Hacks. https:\/\/www.informationisbeautiful.net\/visualizations\/world-biggest-data-breaches-hacks\/ Last visited: 11.02.2020.  David McCandless Tom Evans Paul Barton Stephanie Starling and Ducan Geere. 2020. World's Biggest Data Breaches & Hacks. https:\/\/www.informationisbeautiful.net\/visualizations\/world-biggest-data-breaches-hacks\/ Last visited: 11.02.2020."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987475"},{"volume-title":"Privacy-preserving record linkage using Bloom filters. BMC medical informatics and decision making 9, 1","year":"2009","author":"Schnell Rainer","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Rolf Schwartmann and Steffen Wei\u00df (editors). 2017. White Paper on Pseudonymization Drafted by the Data Protection Focus Group for the Safety Protection and Trust Platform for Society and Businesses in Connection with the 2017 Digital Summit. Technical Report. Digital Summit's data protection focus group.  Rolf Schwartmann and Steffen Wei\u00df (editors). 2017. White Paper on Pseudonymization Drafted by the Data Protection Focus Group for the Safety Protection and Trust Platform for Society and Businesses in Connection with the 2017 Digital Summit. Technical Report. Digital Summit's data protection focus group."},{"key":"e_1_3_2_1_21_1","unstructured":"SpyCloud Inc. 2020. Protect Employees and Consumers from Account Takeover. https:\/\/spycloud.com\/ Last visited: 11.02.2020.  SpyCloud Inc. 2020. Protect Employees and Consumers from Account Takeover. https:\/\/spycloud.com\/ Last visited: 11.02.2020."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3361338.3361446"},{"key":"e_1_3_2_1_25_1","unstructured":"Universit\u00e4t Bonn. 2020. identity leak checker. https:\/\/leakchecker.uni-bonn.de\/ Last visited: 11.02.2020.  Universit\u00e4t Bonn. 2020. identity leak checker. https:\/\/leakchecker.uni-bonn.de\/ Last visited: 11.02.2020."}],"event":{"name":"EICC 2020: European Interdisciplinary Cybersecurity Conference","acronym":"EICC 2020","location":"Rennes France"},"container-title":["Proceedings of the European Interdisciplinary Cybersecurity Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424955","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424954.3424955","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:09Z","timestamp":1750197729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424954.3424955"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":24,"alternative-id":["10.1145\/3424954.3424955","10.1145\/3424954"],"URL":"https:\/\/doi.org\/10.1145\/3424954.3424955","relation":{},"subject":[],"published":{"date-parts":[[2020,11,18]]},"assertion":[{"value":"2021-01-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}