{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:03Z","timestamp":1748751003971,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238289"},{"type":"electronic","value":"9783319238296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23829-6_10","type":"book-chapter","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T11:06:53Z","timestamp":1446894413000},"page":"132-140","source":"Crossref","is-referenced-by-count":1,"title":["Social Authentication Identity: An Alternate to Internet Real Name System"],"prefix":"10.1007","author":[{"given":"Chengcheng","family":"Shao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liang","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shuo","family":"Fan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinwen","family":"Jiang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,8]]},"reference":[{"key":"10_CR1","unstructured":"Statistic Brain. http:\/\/www.statisticbrain.com\/"},{"key":"10_CR2","unstructured":"Danezis, G., Mittal, P.: Sybilinfer: detecting sybil nodes using social networks. In: NDSS (2009)"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Oh, Y., et al.: Empirical analysis of internet identity misuse: case study of South Korean real name system. In: Proceedings of the 6th ACM Workshop on Digital Identity Management. ACM (2010)","DOI":"10.1145\/1866855.1866863"},{"key":"10_CR4","first-page":"239","volume-title":"Economics of Information Security and Privacy III","author":"D Cho","year":"2011","unstructured":"Cho, D.: Real name verification law on the internet: a poison or cure for privacy? In: Schneier, B. (ed.) Economics of Information Security and Privacy III, pp. 239\u2013261. Springer, New York (2011)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Cho, D., Kim, S., Acquisti, A.: Empirical analysis of online anonymity and user behaviors: the impact of real name policy. In: 2012 45th Hawaii International Conference on System Science (HICSS), pp. 3041\u20133050. IEEE (2012)","DOI":"10.1109\/HICSS.2012.241"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/978-3-540-77366-5_11","volume-title":"Financial Cryptography and Data Security","author":"MS Mannan","year":"2007","unstructured":"Mannan, M.S., van Oorschot, P.C.: Using a personal device to strengthen password authentication from an untrusted computer. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 88\u2013103. Springer, Heidelberg (2007)"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1007\/978-3-642-01793-3_92","volume-title":"Advances in Biometrics","author":"ND Sarier","year":"2009","unstructured":"Sarier, N.D.: A new approach for biometric template storage and remote authentication. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 909\u2013918. Springer, Heidelberg (2009)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: using camera phones for human-verifiable authentication. In: 2005 IEEE symposium on Security and Privacy, pp. 110\u2013124. IEEE (2005)","DOI":"10.21236\/ADA457868"},{"key":"10_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-19032-2_3","volume-title":"Knowledge Discovery, Knowlege Engineering and Knowledge Management","author":"J Zhan","year":"2011","unstructured":"Zhan, J., Fang, X.: Authentication using multi-level social networks. In: Fred, A., Dietz, J.L.G., Liu, K., Filipe, J. (eds.) IC3K 2009. CCIS, vol. 128, pp. 35\u201349. Springer, Heidelberg (2011)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Brainard, J., Juels, A., Rivest, R., Szydlo, M., Yung, M.: Fourth-factor authentication: somebody you know. In: Conference on Computer and Communications Security: Proceedings of the 13th ACM Conference on Computer and Communications Security, vol. 30, pp. 168\u2013178 (2006)","DOI":"10.1145\/1180405.1180427"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Schechter, S., Egelman, S., Reeder, R.W.: Its not what you know, but who you know. In: Proc. Conf. Human Factors Comput. Syst. (CHI 2009) (2009)","DOI":"10.1145\/1518701.1519003"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","volume":"13","author":"DM Boyd","year":"2007","unstructured":"Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput. Mediated Commun. 13(1), 210\u2013230 (2007). http:\/\/dx.doi.org\/10.1111\/j.1083-6101.2007.00393.x","journal-title":"J. Comput. Mediated Commun."},{"key":"10_CR13","unstructured":"Xie, B.: The mutual shaping of online and offline social relationships. Inf. Res. 13(3) (2008)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/11569596_31","volume-title":"Computer and Information Sciences - ISCIS 2005","author":"P Pons","year":"2005","unstructured":"Pons, P., Latapy, M.: Computing communities in large networks using random walks. In: Yolum, I., G\u00fcng\u00f6r, T., G\u00fcrgen, F., \u00d6zturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 284\u2013293. Springer, Heidelberg (2005)"},{"key":"10_CR15","unstructured":"SANP of stanford (Online). http:\/\/snap.stanford.edu\/data\/"},{"issue":"6","key":"10_CR16","doi-asserted-by":"publisher","first-page":"066111","DOI":"10.1103\/PhysRevE.70.066111","volume":"70","author":"A Clauset","year":"2004","unstructured":"Clauset, A., Newman, M.E., Moore, C.: Finding community structure in very large networks. Phys. Rev. E 70(6), 066111 (2004)","journal-title":"Phys. Rev. E"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23829-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:26:11Z","timestamp":1748687171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23829-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238289","9783319238296"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23829-6_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}