{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:35:10Z","timestamp":1743071710028,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115689"},{"type":"electronic","value":"9783319115696"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11569-6_38","type":"book-chapter","created":{"date-parts":[[2014,9,27]],"date-time":"2014-09-27T05:00:33Z","timestamp":1411794033000},"page":"487-499","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups"],"prefix":"10.1007","author":[{"given":"Guillaume","family":"Smith","sequence":"first","affiliation":[]},{"given":"Roksana","family":"Boreli","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,28]]},"reference":[{"key":"38_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, J., Diaz, C., Bonneau, J., Stajano, F.: Privacy-enabling social networking over untrusted networks. In: WOSN \u201909, pp. 1\u20136. ACM (2009)","DOI":"10.1145\/1592665.1592667"},{"issue":"4","key":"38_CR2","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"R Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM 39(4), 135\u2013146 (2009)","journal-title":"SIGCOMM"},{"key":"38_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-20901-7_2","volume-title":"Coding and Cryptology","author":"A Beimel","year":"2011","unstructured":"Beimel, A.: Secret-sharing schemes: a survey. In: Chee, Y.M., Guo, Z., Ling, S., Shao, F., Tang, Y., Wang, H., Xing, C. (eds.) IWCC 2011. LNCS, vol. 6639, pp. 11\u201346. Springer, Heidelberg (2011)"},{"key":"38_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-56503-5_68","volume-title":"STACS 93","author":"C Blundo","year":"1993","unstructured":"Blundo, C., Santis, A.D., Vaccaro, U.: Efficient sharing of many secrets. In: Enjalbert, P., Wagner, K.W., Finkel, A. (eds.) STACS 1993. LNCS, vol. 665. Springer, Heidelberg (1993)"},{"key":"38_CR5","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.-H., Datta, A.: Peerson: P2p social networking: early experiences and insights. In: SNS \u201909, pp. 46\u201352. ACM (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"38_CR6","doi-asserted-by":"crossref","unstructured":"Cazabet, R., Leguistin, M., Amblard, F.: Automated community detection on social networks: useful? efficient? asking the users. In: ACM WI&C (2012)","DOI":"10.1145\/2189736.2189745"},{"issue":"1","key":"38_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.amc.2004.04.081","volume":"166","author":"C-W Chan","year":"2005","unstructured":"Chan, C.-W., Chang, C.-C.: A scheme for threshold multi-secret sharing. Appl. Math. Comput. 166(1), 1\u201314 (2005)","journal-title":"Appl. Math. Comput."},{"key":"38_CR8","doi-asserted-by":"crossref","unstructured":"Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: WOSN \u201908, pp. 49\u201354. ACM (2008)","DOI":"10.1145\/1397735.1397747"},{"key":"38_CR9","doi-asserted-by":"crossref","unstructured":"Jahid, S., Mittal, P., Borisov, N.: Easier: encryption-based access control in social networks with efficient revocation. In: ASIACCS \u201911, pp. 411\u2013415. ACM, New York (2011)","DOI":"10.1145\/1966913.1966970"},{"key":"38_CR10","doi-asserted-by":"crossref","unstructured":"Liu, Y., Gummadi, K.P., Krishnamurthy, B., Mislove, A.: Analyzing Facebook privacy settings: user expectations vs. reality. In: 2011 ACM SIGCOMM Conference on Internet Measurement Conference, ACM IMC 2011 (2011)","DOI":"10.1145\/2068816.2068823"},{"issue":"6","key":"38_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/1743546.1743558","volume":"53","author":"A Narayanan","year":"2010","unstructured":"Narayanan, A., Shmatikov, V.: Myths and fallacies of \"personally identifiable information\". Commun. ACM 53(6), 24\u201326 (2010)","journal-title":"Commun. ACM"},{"key":"38_CR12","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.amc.2004.06.120","volume":"167","author":"L-J Pang","year":"2005","unstructured":"Pang, L.-J., Wang, Y.-M.: A new (t, n) multi-secret sharing scheme based on shamir\u2019s secret sharing. Appl. Math. Comput. 167, 840\u2013848 (2005)","journal-title":"Appl. Math. Comput."},{"issue":"2","key":"38_CR13","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1145\/62044.62050","volume":"36","author":"MO Rabin","year":"1989","unstructured":"Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36(2), 335\u2013348 (1989)","journal-title":"J. ACM"},{"issue":"11","key":"38_CR14","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"38_CR15","unstructured":"Ugander, J., Karrer, B., Backstrom, L., Marlow, C.: The anatomy of the Facebook social graph. CoRR, abs\/1111.4503 (2011)"},{"key":"38_CR16","doi-asserted-by":"crossref","unstructured":"Viswanath, B., Mislove, A., Cha, M., Gummadi, K.P.: On the evolution of user interaction in Facebook. In: WOSN (2009)","DOI":"10.1145\/1592665.1592675"},{"key":"38_CR17","unstructured":"Wang, F., Gu, L., Zheng, S., Yang, Y., Hu, Z.: A novel verifiable dynamic multi-policy secret sharing scheme. In: ICACT\u201910, pp. 1474\u20131479. IEEE Press (2010)"},{"key":"38_CR18","unstructured":"Waseda, A., Soshi, M.: Consideration for multi-threshold multi-secret sharing schemes. In: ISITA 2012, pp. 265\u2013269, Oct 2012"},{"issue":"9","key":"38_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1002\/ecja.4410690906","volume":"69","author":"H Yamamoto","year":"1986","unstructured":"Yamamoto, H.: Secret sharing system using (k, l, n) threshold scheme. Electron. Commun. Jpn. (Part I: Commun.) 69(9), 46\u201354 (1986)","journal-title":"Electron. Commun. Jpn. (Part I: Commun.)"},{"issue":"2","key":"38_CR20","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1016\/S0096-3003(03)00355-2","volume":"151","author":"C-C Yang","year":"2004","unstructured":"Yang, C.-C., Chang, T.-Y., Hwang, M.-S.: A (t, n) multi-secret sharing scheme. Appl. Math. Comput. 151(2), 483\u2013490 (2004)","journal-title":"Appl. Math. Comput."},{"key":"38_CR21","doi-asserted-by":"crossref","unstructured":"Yildiz, H., Kruegel, C.: Detecting social cliques for automated privacy control in online social networks. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 353\u2013359 (2012)","DOI":"10.1109\/PerComW.2012.6197509"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking, and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11569-6_38","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,19]],"date-time":"2023-01-19T23:35:48Z","timestamp":1674171348000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11569-6_38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115689","9783319115696"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11569-6_38","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"28 September 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}