{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:53:05Z","timestamp":1725803585800},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319118536"},{"type":"electronic","value":"9783319118543"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11854-3_33","type":"book-chapter","created":{"date-parts":[[2014,8,26]],"date-time":"2014-08-26T06:09:04Z","timestamp":1409033344000},"page":"393-399","source":"Crossref","is-referenced-by-count":6,"title":["Development of a Protocol to Ensure the Safety of User Data in Social Networks, Based on the Backes Method"],"prefix":"10.1007","author":[{"given":"L\u00ea Xu\u00e2n","family":"Quy\u00ean","sequence":"first","affiliation":[]},{"given":"Alla G.","family":"Kravets","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-14623-7_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"M. Abe","year":"2010","unstructured":"Abe, M., Fuchsbauer, G., Groth, J., Haralambiev, K., Ohkubo, M.: Structure-preserving signatures and commitments to group elements. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol.\u00a06223, pp. 209\u2013236. Springer, Heidelberg (2010)"},{"key":"33_CR2","unstructured":"Backes, M., Maffei, M., Pecina, K.: Automated Synthesis of Privacy Preserving Distributed Applications. In: Proc. Network and Distributed System Security Symposium (NDSS 2012). Internet Society (2012)"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-13708-2_14","volume-title":"Applied Cryptography and Network Security","author":"O. Blazy","year":"2010","unstructured":"Blazy, O., Fuchsbauer, G., Izabach\u00e8ne, M., Jambert, A., Sibert, H., Vergnaud, D.: Batch groth\u2013sahai. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol.\u00a06123, pp. 218\u2013235. Springer, Heidelberg (2010)"},{"key":"33_CR4","series-title":"IFIP AICT","first-page":"34","volume-title":"IDMAN 2013","author":"J. Camenisch","year":"2013","unstructured":"Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer H\u00fcbner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol.\u00a0396, pp. 34\u201352. Springer, Heidelberg (2013)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Ghadafi, E., Smart, N.P., Warinschi, B.: Groth\u2013Sahai proofs revisited. Springer (2010)","DOI":"10.1007\/978-3-642-13013-7_11"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-78967-3_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"J. Groth","year":"2008","unstructured":"Groth, J., Sahai, A.: Efficient Non-interactive Proof Systems for Bilinear Groups. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 415\u2013432. Springer, Heidelberg (2008)"},{"key":"33_CR7","first-page":"242","volume-title":"Model of computer networks with certification centres: monograph","author":"V.S. Lukjanov","year":"2009","unstructured":"Lukjanov, V.S., Cherkovasky, I.V., Skakunov, A.V., Bykov, D.V.: Model of computer networks with certification centres: monograph, p. 242. VSTU, Volgograd (2009)"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Maffei, M., Pecina, K.: Position Paper: Privacy-Aware Proof-Carrying Authorization. In: Proc. ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS 2011) (2011)","DOI":"10.1145\/2166956.2166963"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Maffei, M., Reinert, M.: Security and Privacy by Declarative Design. In: 2013 IEEE 26th Computer Security Foundations Symposium (CSF) (2013)","DOI":"10.1109\/CSF.2013.13"},{"key":"33_CR10","first-page":"191","volume":"24","author":"A.A. Chumak","year":"2013","unstructured":"Chumak, A.A., Ukustov, S.S., Kravets, A.G., Voronin, J.F.: Social Networks Message Posting Support Module. World Applied Sciences Journal\u00a024, 191\u2013195 (2013)","journal-title":"World Applied Sciences Journal"}],"container-title":["Communications in Computer and Information Science","Knowledge-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11854-3_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T17:43:38Z","timestamp":1558979018000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11854-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118536","9783319118543"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11854-3_33","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}