{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T02:15:35Z","timestamp":1772763335905,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T00:00:00Z","timestamp":1475712000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s12911-016-0366-4","type":"journal-article","created":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T10:45:45Z","timestamp":1475750745000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Securizing data linkage in french public statistics"],"prefix":"10.1186","volume":"16","author":[{"given":"Maxence","family":"Guesdon","sequence":"first","affiliation":[]},{"given":"Eric","family":"Benzenine","sequence":"additional","affiliation":[]},{"given":"Kamel","family":"Gadouche","sequence":"additional","affiliation":[]},{"given":"Catherine","family":"Quantin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,6]]},"reference":[{"issue":"5","key":"366_CR1","doi-asserted-by":"crossref","first-page":"454","DOI":"10.3414\/ME0546","volume":"47","author":"C Quantin","year":"2008","unstructured":"Quantin C, Fassa M, Coatrieux G, Trouessin G, Allaert FA. Combining hashing and enciphering algorithms for epidemiological analysis of gathered data. Methods Inf Med. 2008; 47(5):454\u20138.","journal-title":"Methods Inf Med"},{"key":"366_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420057133","volume-title":"Cryptography: Theory and Practice","author":"DR Stinson","year":"2005","unstructured":"Stinson DR. Cryptography: Theory and Practice, Third Edition. London: Chapman and Hall\/CRC; 2005."},{"key":"366_CR3","unstructured":"National Institute of Standards and Technology. Secure Hash Standard (SHS). Federal Information Processing Standards Publication; 2012. http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf . Accessed 29 Sept 2016."},{"key":"366_CR4","unstructured":"Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, Referentiel G\u00e9n\u00e9ral de S\u00e9curit\u00e9 version 2.0, Version 2.03 of 21 fevrier; 2014. https:\/\/references.modernisation.gouv.fr\/sites\/default\/files\/RGS_v-2-0_B1.pdf . Accessed 29 Sept 2016."},{"issue":"1","key":"366_CR5","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1055\/s-0038-1633925","volume":"44","author":"C Quantin","year":"2005","unstructured":"Quantin C, Binquet C, Allaert FA, Cornet B, Pattisina R, Leteuff G, et al.Decision analysis for the assessment of a record linkage procedure: application to a perinatal network. Methods Inf Med. 2005; 44(1):72\u20139.","journal-title":"Methods Inf Med"},{"issue":"1","key":"366_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro G. A guided tour to approximate string matching. ACM Comput Surv. 2001; 33(1):31\u201388.","journal-title":"ACM Comput Surv"},{"key":"366_CR7","first-page":"255","volume":"30","author":"C Quantin","year":"2014","unstructured":"Quantin C, Benzenine E, Allaert FA, Guesdon M, Gouyon JB, Riandey B. Epidemiological and Statistical Secured Matching in France. Stat J IAOS. 2014; 30:255\u201361.","journal-title":"Stat J IAOS"},{"key":"366_CR8","first-page":"15","volume":"113\u2013114","author":"C Quantin","year":"2005","unstructured":"Quantin C, Gouyon B, Allaert FA, Cohen O. M\u00e9thodologie pour le cha\u00eenage de donn\u00e9es sensibles tout en respectant l\u2019anonymat : application au suivi des informations medicales. Courrier des statistiques. 2005; 113\u2013114:15\u201326. http:\/\/www.insee.fr\/fr\/themes\/document.asp?id=1501 .","journal-title":"Courrier des statistiques"},{"key":"366_CR9","unstructured":"Bounebache SL, Rey G, Quantin C, Riandey B. Une revue des m\u00e9thodes d\u2019appariement: Applications et perspectives dans le cas des donn\u00e9es de sant\u00e9, In preparation. 2015."},{"issue":"328","key":"366_CR10","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"IP Fellegi","year":"1968","unstructured":"Fellegi IP, Sunter AB. A Theory for Record Linkage. J Am Stat Assoc. 1968; 64(328):1183\u2013210.","journal-title":"J Am Stat Assoc"},{"issue":"5\u20137","key":"366_CR11","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1002\/sim.4780140510","volume":"14","author":"MA Jaro","year":"1995","unstructured":"Jaro MA. Probabilistic linkage of large public health data files. Stat Med. 1995; 14(5\u20137):491\u20138.","journal-title":"Stat Med"},{"issue":"3","key":"366_CR12","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1055\/s-0038-1634527","volume":"37","author":"C Quantin","year":"1998","unstructured":"Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L. Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods Inf Med. 1998; 37(3):271\u20137.","journal-title":"Methods Inf Med"},{"key":"366_CR13","unstructured":"Winkler WE. Using the EM Algorithm for Weight Computation in the Felligi-Sunter Model of Record Linkage. Washington, D.C.: Bureau of the Census Statistical Research Division. Statistical Research Report Series No. RR2000\/05. Report Issued: October 4, 2000."},{"key":"366_CR14","doi-asserted-by":"crossref","unstructured":"Capp\u00e9 O, Moulines E. On-line expectation\u2013maximization algorithm for latent data models. J R Stat Soc Ser B Stat Methodol; 71(3):593\u2013613.","DOI":"10.1111\/j.1467-9868.2009.00698.x"},{"key":"366_CR15","first-page":"91","volume":"150","author":"I Fournel","year":"2009","unstructured":"Fournel I, Schwarzinger M, Binquet C, Benzenine E, Hill C, Quantin C. Contribution of record linkage to vital status determination in cancer patients. Stud Health Technol Inform. 2009; 150:91\u20135.","journal-title":"Stud Health Technol Inform"},{"key":"366_CR16","unstructured":"Fox K, Stratychuk L. M\u00e9thodes de couplage d\u2019enregistrements. atelier du Symposium de Statistique Canada. 2010."},{"key":"366_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04101-3","volume-title":"Understanding cryptography, A Textbook for Students and Practitioners","author":"C Paar","year":"2010","unstructured":"Paar C, Pelzl J. Understanding cryptography, A Textbook for Students and Practitioners. Berlin Heidelberg: Springer-Verlag; 2010. editor2010 ISBN:978-3-642-04100-6."},{"key":"366_CR18","first-page":"49","volume":"121-122","author":"MH Gensbittel","year":"2007","unstructured":"Gensbittel MH, Riandey B, Quantin C. Appariements s\u00e9curis\u00e9s: statisticiens, ayez de l\u2019audace!. Courrier des Stat. 2007; 121-122:49\u201358. http:\/\/www.insee.fr\/fr\/themes\/document.asp?id=2153 .","journal-title":"Courrier des Stat"},{"key":"366_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1246-7391(00)88667-4","volume":"40","author":"S Vuillet-Tavernier","year":"2000","unstructured":"Vuillet-Tavernier S. R\u00e9flexion autour de l\u2019anonymat dans le traitement des donn\u00e9es de sant\u00e9. Med Droit. 2000; 40:1\u20134.","journal-title":"Med Droit"},{"issue":"4","key":"366_CR20","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3406\/staso.2014.933","volume":"2","author":"B Nguyen","year":"2014","unstructured":"Nguyen B. Techniques d\u2019anonymisation. Statistiques et soci\u00e9t\u00e9. 2014; 2(4):43\u201350. http:\/\/publications-sfds.fr\/index.php\/stat_soc\/article\/view\/398 .","journal-title":"Statistiques et soci\u00e9t\u00e9"},{"issue":"3","key":"366_CR21","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1111\/j.1467-842X.2002.tb00682.x","volume":"26","author":"CW Kelman","year":"2002","unstructured":"Kelman CW, Bass AJ, Holman CD. Research use of linked health data \u2013 a best practice protocol. Aust N Z J Public Health. 2002; 26(3):251\u20135.","journal-title":"Aust N Z J Public Health"},{"key":"366_CR22","volume-title":"The \u2019Re-Identification\u2019 of Governor William Weld\u2019s Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now","author":"DC Barth-Jones","year":"2012","unstructured":"Barth-Jones DC. The \u2019Re-Identification\u2019 of Governor William Weld\u2019s Medical Information: A Critical Re-Examination of Health Data Identification Risks and Privacy Protections, Then and Now. Rochester: Social Science Research Network (SSRN); 2012. SSRN:, http:\/\/ssrn.com\/abstract=2076397 ."},{"key":"366_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1186\/1472-6947-9-41","volume":"9","author":"R Schnell","year":"2009","unstructured":"Schnell R, Bachteler T, Reiher J. Privacy-preserving record linkage using Bloom filters. BMC Med Inform Decis Mak. 2009; 9:41.","journal-title":"BMC Med Inform Decis Mak"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-016-0366-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s12911-016-0366-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s12911-016-0366-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T01:48:06Z","timestamp":1749606486000},"score":1,"resource":{"primary":{"URL":"http:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/s12911-016-0366-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,6]]},"references-count":23,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["366"],"URL":"https:\/\/doi.org\/10.1186\/s12911-016-0366-4","relation":{},"ISSN":["1472-6947"],"issn-type":[{"value":"1472-6947","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,6]]},"article-number":"129"}}