{“状态”:“确定”,“消息类型”:“工作”,“信息版本”:“1.0.0”,“邮件”:{“索引”:{-“日期部分”:[[2023,12,20]],“日期时间”:“2023-12-20T00:58:25Z”,“时间戳”:1703033905278},“引用计数”:44,“发布者”:“IEEE”,“内容域”:{:“域”:[],“交叉标记限制”:false},”短容器时间“:[]”,“published-print”:{“日期部分”:[[2014,6]]},“DOI”:“10.1109\/icdcs.2014.27”,“type”:“proceedings-article”,“created”:{“date-parts”:[[2014,9,3]],“date-time”:“2014-09-03T18:36:01Z”,“timestamp”:1409769361000},“source”:”Crossref“,”is-referenced-by-count“:8,”title“:[”e-PPI:个性化隐私保护信息网络中的定位服务“],”前缀“:”10.1109“,“author”:[{“给定”:”于哲”,“family”:“Tang”,“sequence”:“first”,“affiliation”:[]},{“given”:“Ling”,“failment”:“Liu”,“serquence”:“additional”,“filiation(隶属)”:[]},}“giving”:“Arun”,“家族”:“Iyengar”,“序列”:“additionable”,“从属”:[[]}.“张”,“序列”:“附加”,“隶属关系”:[]}],“member”:“263”,“reference”:[{“key”:“19”,“article-title”:“DJoin:分布式数据库上的不同私有连接查询”,“author”:“narayan”,“year”:“2012”,“journal-title“:”OSDI“},{“key”:”35“,”article-title“:”浮点数的安全计算“,”author“:”aliasgari“,”year“:”2013“,”journal-title”:“NDSS”},“key“:”17”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/1866307.1866358”},{“key”:“36”,“article-title”:“使用乱码电路实现更快的安全两方计算”,“author”:“huang”,《年份》:“2011”,“journal-title“:“USENIX安全研讨会”}、{“密钥”:“18”,“首页”:“160”,“article-title”:“异步多方计算:理论与实现”,“作者”:“damgard”,“year”:“2009”,“journal-title”:“Public Key Cryptography”},{“Key”:“33”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICDS.2011.55”}、{“Key”:”15“,“first page”::“287”,“article-title“:”Fairplay-secure two-party computation system“,”author“:”malkhi“,”year“2004”,“日记标题”:“USENIX Security Symposium”};{“密钥”:“”34“,”doi-asserted-by“:“publisher”,“DOI”:“10.1109\/INFCOM.2011.5935306”},{“key”:“16”,“DOI-asserted-by”:“publicher”,“DI:”10.1145\/1455770.1455804“},}“key:”39“,”year“:”0“,”journal-title“:”Nextgate“}:“14”,“DOI-asserted-by”:“publisher”,“DOI”:“10.1145\/1353343.1353380”},{“key”:“37”,“doi-asserted-by”:“publisher”,“doi”:“10.1136\/amiajnl-2011-000335”},{“key”:“11”,“year”:“0”,“journal-title”:“Prism”}、{“密钥”:“38”,“doiasserted-by“:”publisher“,”doi“:”10.1136\/jamia.1997.0040233 8\/50086-0“},{“键”:“21”,“文章标题”:“E-ppi:搜索具有定量隐私保证的信息网络”,“author”:“tang”,“year”:“0”,“journal-title”:“Gerogia Technical Report GITCERCS-14-02”},{“key”:“20”,“article-title“:“An analysis of degration of anonymous protocols”,“author”:“wright”,“year”:“2002”,“journal-ttitle”:,“first page”:“241”,“DOI”:“10.1007\/11535218_15”,“article-title”:“隐私保护集操作”,“author”:“kissner”,“year”:“2005”,“journal-title“:“Advances in Cryptology-CRYPTO 2005 LNCS”},{“key”:”42“,”DOI-asserted-by“:”publisher“,”DOI“:”10.1145\/1774088.1774447“},”{“密钥”:“41”,“DOI-assert-by”:“publisher”,“”DOI“:”10.1145\/2452376.2452398“},{“key”:“40”,“doi-asserted-by”:“publisher”,“doi”:“10.1136\/amiajnl-2012-000917”},{“密钥”:“44”,“doi-asserte-by”:“publisher”,“DI:”10.1017\/CBO9780511813603 publisher“,”doi“:”10.1145\/956863.956903“},{”key“:”24“,”article-title“:“trec-9网络曲目概述”,“作者”:“hawking”,“年份”:“2000”,“journal-title”:“trec”},{“key”:“25”,“年”:“0”,“日记标题”:“Netty”}“10.1145\/1060289.1060313”},{“key”:“29”,“doi-asserted-by”:“publisher”,“doi”:“10.1142\/S0218488502001648”},{“key”:“3”,“year”:“0”,“journal-title”:“Commonwell”}“:”publisher“,”doi“:”10.1145\/775232.775234“},{”key“:”7“,”year“:”0“,”journal-title“:”Diaspora“},{“key”:“6”,“year”:“0”,“journal-title”:“Studip”},{”key“:“32”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/ICDSC.2010.34”}:“2000”,“journal-title”:“IEEE SSP”},{“key”:“4”,“year”:“0”,“journal-title”:“Hippa”},{“key”:“9”,“year”:“0“,”journal-title“:“Commonwell Rls”}:[2014,7,3]]},“container-title”:[“2014 IEEE第34届分布式计算系统国际会议”],“原始标题”:[],“链接”:[{“URL”:“http://\/xplorestaging.IEEE.org\/ielx7\/688815\/688866\/06888895.pdf?arnumber=6888895”,“内容类型”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“存放”:{“日期段”:[[2017,6,22]],“日期时间”:“2017-06-22T19:51:09Z”,“时间戳”:1498161069000},“分数”:1,“资源”:{“主要”:{“URL”:“http://\/ieeexplore.ieee.org\/document\/688895\/”}},”副标题“:[],”短标题“:[],”已发布“:{”日期部分“:[[2014,6]]},‘参考计数’:44,”URL“http:\”\\/dx.doi.org\\10.1109\/icdcs.2014.27“,”关系“:{},”主题“:[],”发布“:{“日期部分”:[[2014,6]]}}