D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut
{"title":"记录链接","authors":"D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut","doi":"10.1007/978-1-4419-5906-5_1281","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"68 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Record Linkage\",\"authors\":\"D. Pointcheval, D. Boneh, J. Quisquater, David Samyde, Gerald Brose, M. Bucci, T. Caddy, G. Bleumer, E. Gabidulin, C. Fontaine, H. Handschuh, P. Samarati, P. Charpin, Trent Jaeger, A.Yu. Biryukov, B. Kaliski, Y. Desmedt, Carlisle M. Adams, M. Polychronakis, David Naccache, Gildas Avoine, Bodo Möller, J. Daemen, V. Rijmen, A. Bosselaers, V. Alturi, D. Ferraiolo, A. Campi, W. Casper, S. Papa, Padmaraj M. V. Nair, Ronald L. Rivest, T. Helleseth, A. Canteaut\",\"doi\":\"10.1007/978-1-4419-5906-5_1281\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":388560,\"journal\":{\"name\":\"Encyclopedia of Cryptography and Security\",\"volume\":\"68 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Encyclopedia of Cryptography and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1007/978-1-4419-5906-5_1281\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Encyclopedia of Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/978-1-4419-5906-5_1281","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}