{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:37:15Z","timestamp":1759639035854},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079585"},{"type":"electronic","value":"9783319079592"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07959-2_32","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:44:25Z","timestamp":1402404265000},"page":"376-387","source":"Crossref","is-referenced-by-count":16,"title":["Improved Upper and Lower Bound Heuristics for Degree Anonymization in Social Networks"],"prefix":"10.1007","author":[{"given":"Sepp","family":"Hartung","sequence":"first","affiliation":[]},{"given":"Clemens","family":"Hoffmann","sequence":"additional","affiliation":[]},{"given":"Andr\u00e9","family":"Nichterlein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5439","key":"32_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A. Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A., Albert, R.: Emergence of scaling in random networks. Science\u00a0286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"key":"32_CR2","unstructured":"Berthom\u00e9, P., Lalande, J.-F., Levorato, V.: Implementation of exponential and parametrized algorithms in the AGAPE project. CoRR, abs\/1201.5985 (2012)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Casas-Roma, J., Herrera-Joancomart\u00ed, J., Torra, V.: An algorithm for k-degree anonymity on large networks. In: Proc. ASONAM 2013, pp. 671\u2013675. ACM\u00a0Press (2013)","DOI":"10.1145\/2492517.2492643"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Chester, S., Gaertner, J., Stege, U., Venkatesh, S.: Anonymizing subsets of social networks with degree constrained subgraphs. In: Proc. ASONAM 2012, pp. 418\u2013422. IEEE Computer Society (2012)","DOI":"10.1109\/ASONAM.2012.74"},{"key":"32_CR5","unstructured":"DIMACS 2012. Graph partitioning and graph clustering. 10th DIMACS challenge (2012), http:\/\/www.cc.gatech.edu\/dimacs10\/ (accessed April 2012)"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Easley, D., Kleinberg, J.: Networks, Crowds, and Markets. Cambridge University Press (2010)","DOI":"10.1017\/CBO9780511761942"},{"key":"32_CR7","unstructured":"Erd\u0151s, P., Gallai, T.: Graphs with prescribed degrees of vertices. Math. Lapok\u00a011, 264\u2013274 (1960) (in Hungarian)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys\u00a042(4), 14:1\u201314:53 (2010)","DOI":"10.1145\/1749603.1749605"},{"key":"32_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1007\/978-3-642-39212-2_52","volume-title":"Automata, Languages, and Programming","author":"S. Hartung","year":"2013","unstructured":"Hartung, S., Nichterlein, A., Niedermeier, R., Such\u00fd, O.: A refined complexity analysis of degree anonymization in graphs. In: Fomin, F.V., Freivalds, R., Kwiatkowska, M., Peleg, D. (eds.) ICALP 2013, Part II. LNCS, vol.\u00a07966, pp. 594\u2013606. Springer, Heidelberg (2013)"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Hartung, S., Hoffmann, C., Nichterlein, A.: Improved upper and lower bound heuristics for degree anonymization in social networks. CoRR, abs\/1402.6239 (2014)","DOI":"10.1007\/978-3-319-07959-2_32"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proc. SIGMOD 2008, pp. 93\u2013106. ACM (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"32_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-32600-4_21","volume-title":"Database and Expert Systems Applications","author":"X. Lu","year":"2012","unstructured":"Lu, X., Song, Y., Bressan, S.: Fast identity anonymization on graphs. In: Liddle, S.W., Schewe, K.-D., Tjoa, A.M., Zhou, X. (eds.) DEXA 2012, Part I. LNCS, vol.\u00a07446, pp. 281\u2013295. Springer, Heidelberg (2012)"},{"issue":"6","key":"32_CR13","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P. Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Transactions on Knowledge and Data Engineering\u00a013(6), 1010\u20131027 (2001)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proc. PODS 1998, pp. 188\u2013188. ACM (1998)","DOI":"10.1145\/275487.275508"},{"issue":"5","key":"32_CR15","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems\u00a010(5), 557\u2013570 (2002)","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Thompson, B., Yao, D.: The union-split algorithm and cluster-based anonymization of social networks. In: Proc. 4th ASIACCS 2009, pp. 218\u2013227. ACM (2009)","DOI":"10.1145\/1533057.1533088"},{"issue":"1-3","key":"32_CR17","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/S0012-365X(02)00886-5","volume":"265","author":"A. Tripathi","year":"2003","unstructured":"Tripathi, A., Vijay, S.: A note on a theorem of Erd\u00f6s & Gallai. Discrete Math.\u00a0265(1-3), 417\u2013420 (2003)","journal-title":"Discrete Math."},{"issue":"1","key":"32_CR18","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10115-010-0311-2","volume":"28","author":"B. Zhou","year":"2011","unstructured":"Zhou, B., Pei, J.: The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowledge and Information Systems\u00a028(1), 47\u201377 (2011)","journal-title":"Knowledge and Information Systems"},{"issue":"2","key":"32_CR19","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B. Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM SIGKDD Explorations Newsletter\u00a010(2), 12\u201322 (2008)","journal-title":"ACM SIGKDD Explorations Newsletter"}],"container-title":["Lecture Notes in Computer Science","Experimental Algorithms"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07959-2_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T07:27:29Z","timestamp":1565508449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07959-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079585","9783319079592"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07959-2_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}