{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T06:19:52Z","timestamp":1743056392106,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319498058"},{"type":"electronic","value":"9783319498065"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-49806-5_18","type":"book-chapter","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T07:34:29Z","timestamp":1479886469000},"page":"336-355","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Privacy Preserving Network Analysis of Distributed Social Networks"],"prefix":"10.1007","author":[{"given":"Varsha Bhat","family":"Kukkala","sequence":"first","affiliation":[]},{"given":"Jaspal Singh","family":"Saini","sequence":"additional","affiliation":[]},{"given":"S. R. S.","family":"Iyengar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,24]]},"reference":[{"issue":"5439","key":"18_CR1","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si, A.L., Albert, R.: Emergence of scaling in random networks. Science 286(5439), 509\u2013512 (1999)","journal-title":"Science"},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1007\/s100510050067","volume":"13","author":"A Barrat","year":"2000","unstructured":"Barrat, A., Weigt, M.: On the properties of small-world network models. Eur. Phys. J. B-Condens. Matter Complex Syst. 13(3), 547\u2013560 (2000)","journal-title":"Eur. Phys. J. B-Condens. Matter Complex Syst."},{"issue":"12","key":"18_CR3","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan, M., Newman, M.E.: Community structure in social and biological networks. Proc. National Acad. Sci. 99(12), 7821\u20137826 (2002)","journal-title":"Proc. National Acad. Sci."},{"issue":"4","key":"18_CR4","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/S0378-8733(99)00019-2","volume":"21","author":"SP Borgatti","year":"2000","unstructured":"Borgatti, S.P., Everett, M.G.: Models of core\/periphery structures. Soc. Netw. 21(4), 375\u2013395 (2000)","journal-title":"Soc. Netw."},{"issue":"1","key":"18_CR5","doi-asserted-by":"publisher","first-page":"018102","DOI":"10.1103\/PhysRevLett.94.018102","volume":"94","author":"VM Eguiluz","year":"2005","unstructured":"Eguiluz, V.M., Chialvo, D.R., Cecchi, G.A., Baliki, M., Apkarian, A.V.: Scale-free brain functional networks. Phys. Rev. Lett. 94(1), 018102 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/j.jom.2010.11.001","volume":"29","author":"Y Kim","year":"2011","unstructured":"Kim, Y., Choi, T.Y., Yan, T., Dooley, K.: Structural investigation of supply networks: a social network analysis approach. J. Oper. Manage. 29(3), 194\u2013211 (2011)","journal-title":"J. Oper. Manage."},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1111\/j.1740-9713.2012.00594.x","volume":"9","author":"D Easley","year":"2012","unstructured":"Easley, D., Kleinberg, J., et al.: Networks, crowds, and markets: reasoning about a highly connected world. Significance 9, 43\u201344 (2012)","journal-title":"Significance"},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1080\/08898480701612899","volume":"14","author":"F Liljeros","year":"2007","unstructured":"Liljeros, F., Giesecke, J., Holme, P.: The contact network of inpatients in a regional healthcare system. a longitudinal case study. Math. Popul. Stud. 14(4), 269\u2013284 (2007)","journal-title":"Math. Popul. Stud."},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"e1001109","DOI":"10.1371\/journal.pcbi.1001109","volume":"7","author":"LE Rocha","year":"2011","unstructured":"Rocha, L.E., Liljeros, F., Holme, P.: Simulated epidemics in an empirical spatiotemporal network of 50,185 sexual contacts. PLoS Comput. Biol. 7(3), e1001109 (2011)","journal-title":"PLoS Comput. Biol."},{"issue":"8","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"18_CR11","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/TKDE.2011.232","volume":"25","author":"T Tassa","year":"2013","unstructured":"Tassa, T., Cohen, D.J.: Anonymization of centralized and distributed social networks by sequential clustering. IEEE Trans. Knowl. Data Eng. 25(2), 311\u2013324 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187. IEEE (2009)","key":"18_CR12","DOI":"10.1109\/SP.2009.22"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shi, E., Rubinstein, B.I.: Link prediction by de-anonymization: How we won the kaggle social network challenge. In: The 2011 International Joint Conference on Neural Networks (IJCNN), pp. 1825\u20131834. IEEE (2011)","key":"18_CR13","DOI":"10.1109\/IJCNN.2011.6033446"},{"doi-asserted-by":"crossref","unstructured":"Bhaskar, R., Laxman, S., Smith, A., Thakurta, A.: Discovering frequent patterns in sensitive data. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 503\u2013512. ACM (2010)","key":"18_CR14","DOI":"10.1145\/1835804.1835869"},{"doi-asserted-by":"crossref","unstructured":"Kleinberg, J.M.: Challenges in mining social network data: processes, privacy, and paradoxes. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 4\u20135. ACM (2007)","key":"18_CR15","DOI":"10.1145\/1281192.1281195"},{"doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: Robust de-anonymization of large sparse datasets. In: IEEE Symposium on Security and Privacy, SP 2008, pp. 111\u2013125. IEEE (2008)","key":"18_CR16","DOI":"10.1109\/SP.2008.33"},{"doi-asserted-by":"crossref","unstructured":"Xue, M., Karras, P., Chedy, R., Kalnis, P., Pung, H.K.: Delineating social network data anonymization via random edge perturbation. In: Proceedings of the 21st ACM International Conference on Information and Knowledge Management, pp. 475\u2013484. ACM (2012)","key":"18_CR17","DOI":"10.1145\/2396761.2396823"},{"issue":"1","key":"18_CR18","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s11280-013-0240-6","volume":"18","author":"AM Fard","year":"2015","unstructured":"Fard, A.M., Wang, K.: Neighborhood randomization for link privacy in social network analysis. World Wide Web 18(1), 9\u201332 (2015)","journal-title":"World Wide Web"},{"doi-asserted-by":"crossref","unstructured":"Hogg, T., Adamic, L.: Enhancing reputation mechanisms via online social networks. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 236\u2013237. ACM (2004)","key":"18_CR19","DOI":"10.1145\/988772.988811"},{"key":"18_CR20","first-page":"160","volume":"82","author":"ACC Yao","year":"1982","unstructured":"Yao, A.C.C.: Protocols for secure computations. FOCS 82, 160\u2013164 (1982)","journal-title":"FOCS"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/11593447_13","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"J Brickell","year":"2005","unstructured":"Brickell, J., Shmatikov, V.: Privacy-preserving graph algorithms in the semi-honest model. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 236\u2013252. Springer, Heidelberg (2005). doi:\n                      10.1007\/11593447_13"},{"key":"18_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-39884-1_21","volume-title":"Financial Cryptography and Data Security","author":"A Aly","year":"2013","unstructured":"Aly, A., Cuvelier, E., Mawet, S., Pereira, O., Vyve, M.: Securely solving simple combinatorial graph problems. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 239\u2013257. Springer, Heidelberg (2013). doi:\n                      10.1007\/978-3-642-39884-1_21"},{"key":"18_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-319-15943-0_13","volume-title":"Information Security and Cryptology \u2013 ICISC 2014","author":"A Aly","year":"2015","unstructured":"Aly, A., Vyve, M.: Securely solving classical network flow problems. In: Lee, J., Kim, J. (eds.) ICISC 2014. LNCS, vol. 8949, pp. 205\u2013221. Springer, Heidelberg (2015). doi:\n                      10.1007\/978-3-319-15943-0_13"},{"doi-asserted-by":"crossref","unstructured":"Blanton, M., Steele, A., Alisagari, M.: Data-oblivious graph algorithms for secure computation and outsourcing. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 207\u2013218. ACM (2013)","key":"18_CR24","DOI":"10.1145\/2484313.2484341"},{"doi-asserted-by":"crossref","unstructured":"Frikken, K.B., Golle, P.: Private social network analysis: how to assemble pieces of a graph privately. In: Proceedings of the 5th ACM Workshop on Privacy in Electronic Society, pp. 89\u201398. ACM (2006)","key":"18_CR25","DOI":"10.1145\/1179601.1179619"},{"doi-asserted-by":"crossref","unstructured":"Kukkala, V.B., Iyengar, S., Saini, J.S.: Secure multiparty graph computation. In: 2016 8th International Conference on Communication Systems and Networks (COMSNETS), pp. 1\u20132. IEEE (2016)","key":"18_CR26","DOI":"10.1109\/COMSNETS.2016.7439973"},{"doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Schaad, A.: Privacy-preserving social network analysis for criminal investigations. In: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pp. 9\u201314. ACM (2008)","key":"18_CR27","DOI":"10.1145\/1456403.1456406"},{"unstructured":"Fridgen, G., Garizy, T.Z.: Supply chain network risk analysis - A privacy preserving approach. In: 23rd European Conference on Information Systems, ECIS 2015, M\u00fcnster, Germany, 26\u201329 May 2015","key":"18_CR28"},{"unstructured":"Tassa, T., Bonchi, F.: Privacy preserving estimation of social influence. In: EDBT, pp. 559\u2013570 (2014)","key":"18_CR29"},{"unstructured":"Cramer, R., Damgard, I., Nielsen, J.B.: Secure multiparty computation and secret sharing-an information theoretic appoach. Book Draft (2012)","key":"18_CR30"},{"doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1\u201310. ACM (1988)","key":"18_CR31","DOI":"10.1145\/62212.62213"},{"key":"18_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 99","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi:\n                      10.1007\/3-540-48910-X_16"},{"key":"18_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/11681878_15","volume-title":"Theory of Cryptography","author":"I Damg\u00e5rd","year":"2006","unstructured":"Damg\u00e5rd, I., Fitzi, M., Kiltz, E., Nielsen, J.B., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 285\u2013304. Springer, Heidelberg (2006). doi:\n                      10.1007\/11681878_15"},{"unstructured":"Kukkala, V.B., Saini, J.S., Iyengar, S.: Privacy preserving network analysis of distributed social networks. Cryptology ePrint Archive, Report 2016\/427 (2016). \n                      http:\/\/eprint.iacr.org\/2016\/427","key":"18_CR34"},{"issue":"6825","key":"18_CR35","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1038\/35065725","volume":"410","author":"SH Strogatz","year":"2001","unstructured":"Strogatz, S.H.: Exploring complex networks. Nature 410(6825), 268\u2013276 (2001)","journal-title":"Nature"},{"issue":"1","key":"18_CR36","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1103\/RevModPhys.74.47","volume":"74","author":"R Albert","year":"2002","unstructured":"Albert, R., Barab\u00e1si, A.L.: Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"4","key":"18_CR37","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1080\/00018730110112519","volume":"51","author":"SN Dorogovtsev","year":"2002","unstructured":"Dorogovtsev, S.N., Mendes, J.F.: Evolution of networks. Adv. Phys. 51(4), 1079\u20131187 (2002)","journal-title":"Adv. Phys."},{"issue":"5461","key":"18_CR38","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1126\/science.287.5461.2115a","volume":"287","author":"LA Adamic","year":"2000","unstructured":"Adamic, L.A., Huberman, B.A.: Power-law distribution of the world wide web. Science 287(5461), 2115\u20132115 (2000)","journal-title":"Science"},{"doi-asserted-by":"crossref","unstructured":"Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the internet topology. In: ACM SIGCOMM Computer Communication Review, vol. 29, pp. 251\u2013262. ACM (1999)","key":"18_CR39","DOI":"10.1145\/316194.316229"},{"doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 29\u201342. ACM (2007)","key":"18_CR40","DOI":"10.1145\/1298306.1298311"},{"issue":"6","key":"18_CR41","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1121\/1.1906679","volume":"22","author":"A Bavelas","year":"1950","unstructured":"Bavelas, A.: Communication patterns in task-oriented groups. J. Acoust. Soc. Am. 22(6), 726\u2013730 (1950)","journal-title":"J. Acoust. Soc. Am."},{"key":"18_CR42","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478","volume-title":"Social Network Analysis: Methods and Applications","author":"S Wasserman","year":"1994","unstructured":"Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications, vol. 8. Cambridge University Press, Cambridge (1994)"},{"doi-asserted-by":"crossref","unstructured":"Hsieh, C.S., Kov\u00e1\u0159\u00edk, J., Logan, T.: How central are clients in sexual networks created by commercial sex? Scientific reports 4 (2014)","key":"18_CR43","DOI":"10.1038\/srep07540"},{"unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: bringing order to the web (1999)","key":"18_CR44"},{"issue":"18","key":"18_CR45","doi-asserted-by":"publisher","first-page":"3825","DOI":"10.1016\/j.comnet.2012.10.007","volume":"56","author":"S Brin","year":"2012","unstructured":"Brin, S., Page, L.: Reprint of: the anatomy of a large-scale hypertextual web search engine. Comput. Netw. 56(18), 3825\u20133833 (2012)","journal-title":"Comput. Netw."},{"issue":"6","key":"18_CR46","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/1953122.1953146","volume":"54","author":"M Franceschet","year":"2011","unstructured":"Franceschet, M.: Pagerank: standing on the shoulders of giants. Commun. ACM 54(6), 92\u2013101 (2011)","journal-title":"Commun. ACM"},{"issue":"11","key":"18_CR47","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1038\/nphys1746","volume":"6","author":"M Kitsak","year":"2010","unstructured":"Kitsak, M., Gallos, L.K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H.E., Makse, H.A.: Identification of influential spreaders in complex networks. Nature Phys. 6(11), 888\u2013893 (2010)","journal-title":"Nature Phys."},{"unstructured":"Batagelj, V., Zaversnik, M.: An o (m) algorithm for cores decomposition of networks. arXiv preprint cs\/0310049 (2003)","key":"18_CR48"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-49806-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:38:44Z","timestamp":1558316324000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-49806-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319498058","9783319498065"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-49806-5_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"24 November 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Systems Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciss2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iciss16.mnit.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}