{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:40:01Z","timestamp":1748799601793,"version":"3.41.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319298139"},{"type":"electronic","value":"9783319298146"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-29814-6_40","type":"book-chapter","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T09:04:46Z","timestamp":1457341486000},"page":"467-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN"],"prefix":"10.1007","author":[{"given":"Shangqi","family":"Lai","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]},{"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"key":"40_CR1","unstructured":"Announcing the ADVANCED ENCRYPTION STANDARD (AES). No. 197 in Federal Information Processing Standards Publication, United States National Institute of Standards and Technology (NIST) (2001)"},{"key":"40_CR2","unstructured":"HTML5 Specification. World Wide Web Consortium (W3C) (2015)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-Policy Attribute-Based Encryption. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), pp. 321\u2013334, Oakland, California, USA (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001)"},{"key":"40_CR5","unstructured":"Cheng, J.: Ars Technica: Three Years Later, Deleting Your Photos on Facebook Now Actually Works. http:\/\/arstechnica.com\/business\/2012\/08\/facebook-finally-changes-photo-deletion-policy-after-3-years-of-reporting"},{"key":"40_CR6","unstructured":"Digital Bazaar, I.: Forge: Javascript security and cryptography. http:\/\/digitalbazaar.com\/forge\/"},{"issue":"4","key":"40_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"TE Gamal","year":"1985","unstructured":"Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 89\u201398. ACM, Alexandria, VA, USA, October 30 - November 3, 2006","DOI":"10.1145\/1180405.1180418"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Leom, M.D., D\u2019Orazio, C.J., Deegan, G., Choo, K.K.R.: Forensic collection and analysis of thumbnails in android. In: 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1059\u20131066. IEEE Computer Society Press (2015)","DOI":"10.1109\/Trustcom.2015.483"},{"issue":"2","key":"40_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIC.2014.107","volume":"19","author":"K Liang","year":"2015","unstructured":"Liang, K., Liu, J.K., Lu, R., Wong, D.S.: Privacy concerns for photo sharing in online social networks. IEEE Internet Comput. 19(2), 58\u201363 (2015)","journal-title":"IEEE Internet Comput."},{"key":"40_CR11","unstructured":"Quick, D., Tassone, C., Choo, K.R.: Forensic Analysis of Windows Thumbcache files. In: 20th Americas Conference on Information Systems, AMCIS 2014, Savannah, Georgia, USA, 7\u20139 August, 2014"},{"issue":"1","key":"40_CR12","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/357980.358017","volume":"26","author":"RL Rivest","year":"1983","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Commun. ACM 26(1), 96\u201399 (1983)","journal-title":"Commun. ACM"},{"key":"40_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology","author":"A Shamir","year":"1985","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47\u201353. Springer, Heidelberg (1985)"},{"key":"40_CR14","unstructured":"Whittaker, Z.: ZDNet: Facebook Does Not Erase User-Deleted Content. http:\/\/www.zdnet.com\/blog\/igeneration\/facebook-does-not-erase-user-deleted-content\/4808"},{"key":"40_CR15","unstructured":"Zhu, Y.: Sina app: Weibo tuchuang (in Chinese). https:\/\/hk.v2ex.com\/t\/44453#reply149"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-29814-6_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T17:20:40Z","timestamp":1748798440000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-29814-6_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319298139","9783319298146"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-29814-6_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"5 March 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}