{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T05:07:25Z","timestamp":1679461645814},"reference-count":0,"publisher":"Society for Imaging Science & Technology","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ei"],"DOI":"10.2352\/ei.2023.35.4.mwsf-377","type":"journal-article","created":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T07:08:35Z","timestamp":1679382515000},"page":"377--1-377-6","source":"Crossref","is-referenced-by-count":0,"title":["Privacy preserving leak detection in peer-to-peer communication"],"prefix":"10.2352","volume":"35","author":[{"given":"Julian","family":"Heeger","sequence":"first","affiliation":[]},{"given":"Simon","family":"Bugert","sequence":"additional","affiliation":[]},{"given":"Waldemar","family":"Berchtold","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Gruler","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Steinebach","sequence":"additional","affiliation":[]}],"member":"1209","published-online":{"date-parts":[[2023,1,16]]},"container-title":["Electronic Imaging"],"original-title":[],"link":[{"URL":"https:\/\/library.imaging.org\/ei\/articles\/35\/4\/MWSF-377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,21]],"date-time":"2023-03-21T07:08:35Z","timestamp":1679382515000},"score":1,"resource":{"primary":{"URL":"https:\/\/library.imaging.org\/ei\/articles\/35\/4\/MWSF-377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":0,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,1,16]]}},"URL":"https:\/\/doi.org\/10.2352\/ei.2023.35.4.mwsf-377","relation":{},"ISSN":["2470-1173"],"issn-type":[{"value":"2470-1173","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,1,16]]}}}