<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Andris Ambainis</style></author><author><style face="normal" font="default" size="100%">Markus Jakobsson</style></author><author><style face="normal" font="default" size="100%">Helger Lipmaa</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Feng Bao</style></author><author><style face="normal" font="default" size="100%">Robert H. Deng</style></author><author><style face="normal" font="default" size="100%">Jianying Zhou</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">Cryptographic Randomized Response Techniques</style></title><secondary-title><style face="normal" font="default" size="100%">Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Computer Science 2947</style></publisher><pub-location><style face="normal" font="default" size="100%">Singapore</style></pub-location><pages><style face="normal" font="default" size="100%">425-438</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record></records></xml>