{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T06:41:50Z","timestamp":1720334510395},"reference-count":7,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1016\/j.ipl.2023.106380","type":"journal-article","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T16:15:20Z","timestamp":1676650520000},"page":"106380","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Comparing approximate and probabilistic differential privacy parameters"],"prefix":"10.1016","volume":"182","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2301-8716","authenticated-orcid":false,"given":"Vincent","family":"Guingona","sequence":"first","affiliation":[]},{"given":"Alexei","family":"Kolesnikov","sequence":"additional","affiliation":[]},{"given":"Julianne","family":"Nierwinski","sequence":"additional","affiliation":[]},{"given":"Avery","family":"Schweitzer","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.ipl.2023.106380_br0010","first-page":"288","article-title":"Sok: differential privacies","volume":"2020","author":"Desfontaines","year":"2020","journal-title":"Proc. Priv. Enh. Technol."},{"key":"10.1016\/j.ipl.2023.106380_br0020","series-title":"International Colloquium on Automata, Languages, and Programming","first-page":"1","article-title":"Differential privacy","author":"Dwork","year":"2006"},{"key":"10.1016\/j.ipl.2023.106380_br0030","series-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"486","article-title":"Our data, ourselves: privacy via distributed noise generation","author":"Dwork","year":"2006"},{"key":"10.1016\/j.ipl.2023.106380_br0040","series-title":"Theory of Cryptography Conference","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","author":"Dwork","year":"2006"},{"issue":"3\u20134","key":"10.1016\/j.ipl.2023.106380_br0050","first-page":"211","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Found. Trends Theor. Comput. Sci."},{"key":"10.1016\/j.ipl.2023.106380_br0060","first-page":"277","article-title":"Approximate and probabilistic differential privacy definitions","volume":"2018","author":"Meiser","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.ipl.2023.106380_br0070","author":"Zhao"}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019023000236?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020019023000236?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T15:38:03Z","timestamp":1684251483000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020019023000236"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":7,"alternative-id":["S0020019023000236"],"URL":"https:\/\/doi.org\/10.1016\/j.ipl.2023.106380","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[2023,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Comparing approximate and probabilistic differential privacy parameters","name":"articletitle","label":"Article Title"},{"value":"Information Processing Letters","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ipl.2023.106380","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2023 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106380"}}