{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T07:50:15Z","timestamp":1745567415059,"version":"3.37.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_11","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"133-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["End-to-End Encryption Schemes for Online Social Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8771-8290","authenticated-orcid":false,"given":"Fabian","family":"Schillinger","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8320-8581","authenticated-orcid":false,"given":"Christian","family":"Schindelhauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"unstructured":"ANSI: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical report ANSI X9.62, ANSI (1999)","key":"11_CR1"},{"unstructured":"Can I use web cryptography. \n                    https:\/\/caniuse.com\/#feat=cryptography","key":"11_CR2"},{"doi-asserted-by":"publisher","unstructured":"Chen, L., Zhou, S.: The comparisons between public key and symmetric key cryptography in protecting storage systems. In: 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), vol. 4, pp. V4\u2013494-V4-502, October 2010. \n                    https:\/\/doi.org\/10.1109\/ICCASM.2010.5620632","key":"11_CR3","DOI":"10.1109\/ICCASM.2010.5620632"},{"doi-asserted-by":"crossref","unstructured":"Facebook Q3 2018 results. \n                    https:\/\/s21.q4cdn.com\/399680738\/files\/doc_financials\/2018\/Q3\/Q3-2018-Earnings-Presentation.pdf","key":"11_CR4","DOI":"10.1016\/S1365-6937(18)30263-6"},{"doi-asserted-by":"publisher","unstructured":"Finney, H., Donnerhacke, L., Callas, J., Thayer, R.L., Shaw, D.: OpenPGP message format. RFC 4880, November 2007. \n                    https:\/\/doi.org\/10.17487\/RFC4880\n                    \n                  , \n                    https:\/\/rfc-editor.org\/rfc\/rfc4880.txt","key":"11_CR5","DOI":"10.17487\/RFC4880"},{"doi-asserted-by":"publisher","unstructured":"Guha, S., Tang, K., Francis, P.: NOYB: privacy in online social networks. In: Proceedings of the First Workshop on Online Social Networks, WOSN 2008, pp. 49\u201354. ACM, New York (2008). \n                    https:\/\/doi.org\/10.1145\/1397735.1397747\n                    \n                  , \n                    http:\/\/doi.acm.org\/10.1145\/1397735.1397747","key":"11_CR6","DOI":"10.1145\/1397735.1397747"},{"doi-asserted-by":"publisher","unstructured":"Hassinen, M.: SafeSMS - end-to-end encryption for SMS. In: Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005, vol. 2, pp. 359\u2013365, June 2005. \n                    https:\/\/doi.org\/10.1109\/CONTEL.2005.185905","key":"11_CR7","DOI":"10.1109\/CONTEL.2005.185905"},{"doi-asserted-by":"publisher","unstructured":"Klensin, D.J.C.: Simple mail transfer protocol. RFC 5321, October 2008. \n                    https:\/\/doi.org\/10.17487\/RFC5321\n                    \n                  , \n                    https:\/\/rfc-editor.org\/rfc\/rfc5321.txt","key":"11_CR8","DOI":"10.17487\/RFC5321"},{"doi-asserted-by":"crossref","unstructured":"Lauinger, T., Chaabane, A., Arshad, S., Robertson, W., Wilson, C., Kirda, E.: Thou shalt not depend on me: Analysing the use of outdated javascript libraries on the web. In: Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS 2017). The Internet Society (2017)","key":"11_CR9","DOI":"10.14722\/ndss.2017.23414"},{"doi-asserted-by":"publisher","unstructured":"Lucas, M.M., Borisov, N.: FlyByNight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, WPES 2008, pp. 1\u20138. ACM, New York (2008). \n                    https:\/\/doi.org\/10.1145\/1456403.1456405\n                    \n                  , \n                    https:\/\/doi.acm.org\/10.1145\/1456403.1456405","key":"11_CR10","DOI":"10.1145\/1456403.1456405"},{"unstructured":"Marlinspike, M.: The double ratchet algorithm. \n                    https:\/\/signal.org\/docs\/specifications\/doubleratchet\/","key":"11_CR11"},{"unstructured":"Marlinspike, M.: The X3DH key agreement protocol. \n                    https:\/\/signal.org\/docs\/specifications\/x3dh\/","key":"11_CR12"},{"unstructured":"OTR development team: off-the-record messaging protocol version 3. \n                    https:\/\/otr.cypherpunks.ca\/Protocol-v3-4.1.1.html","key":"11_CR13"},{"issue":"2","key":"11_CR14","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"unstructured":"Straub, A.: XEP-0384: OMEMO encryption (1999\u20132018). \n                    https:\/\/xmpp.org\/extensions\/xep-0384.html","key":"11_CR15"},{"doi-asserted-by":"publisher","unstructured":"Turner, S., Ramsdell, B.C.: Secure\/multipurpose internet mail extensions (S\/MIME) version 3.2 message specification. RFC 5751, January 2010. \n                    https:\/\/doi.org\/10.17487\/RFC5751\n                    \n                  , \n                    https:\/\/rfc-editor.org\/rfc\/rfc5751.txt","key":"11_CR16","DOI":"10.17487\/RFC5751"},{"unstructured":"Web cryptography API - W3C recommendation 26 January 2017. \n                    https:\/\/www.w3.org\/TR\/2017\/REC-WebCryptoAPI-20170126\/","key":"11_CR17"},{"unstructured":"Number of daily active WhatsApp status users from 1st quarter 2017 to 2nd quarter 2018 (in millions). \n                    https:\/\/www.statista.com\/statistics\/730306\/whatsapp-status-dau\/","key":"11_CR18"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:05:24Z","timestamp":1562771124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}