{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:12:44Z","timestamp":1750824764957,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644189"},{"type":"electronic","value":"9783319644196"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64419-6_9","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T02:42:00Z","timestamp":1502851320000},"page":"69-75","source":"Crossref","is-referenced-by-count":1,"title":["A Bi-level Security Mechanism for Efficient Protection on Graphs in Online Social Network"],"prefix":"10.1007","author":[{"given":"D.","family":"Franklin Vinod","sequence":"first","affiliation":[]},{"given":"V.","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1109\/ACCESS.2014.2325029","volume":"2","author":"C Xue-Wen","year":"2014","unstructured":"Xue-Wen, C., Xiaotong, L.: Big data deep learning: challenges and perspectives. IEEE Access 2, 514\u2013525 (2014)","journal-title":"IEEE Access"},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"1821","DOI":"10.1109\/ACCESS.2016.2558446","volume":"4","author":"M Abid","year":"2016","unstructured":"Abid, M., Iynkaran, N., Yong, X., Guang, H., Song, G.: Protection of big data privacy. IEEE Access 4, 1821\u20131834 (2016)","journal-title":"IEEE Access"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Avita, K., Mohammad, W., Goudar, R.H.: Big data: issues, challenges, tools and good practices. In: The Proceedings of the Sixth International Conference on Contemporary Computing (IC3), Noida, pp. 404\u2013409 (2013)","DOI":"10.1109\/IC3.2013.6612229"},{"key":"9_CR4","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/ACCESS.2014.2332453","volume":"2","author":"H Han","year":"2014","unstructured":"Han, H., Yonggang, W., Tat Seng, C., Xuelong, L.: Toward scalable systems for big data analytics: a technology tutorial. IEEE Access 2, 652\u2013687 (2014)","journal-title":"IEEE Access"},{"key":"9_CR5","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1109\/ACCESS.2014.2362522","volume":"2","author":"X Lei","year":"2014","unstructured":"Lei, X., Chunxiao, J., Jian, W., Jian, Y., Yong, R.: Information security in big data: privacy and data mining. IEEE Access 2, 1149\u20131176 (2014)","journal-title":"IEEE Access"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"key":"9_CR7","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MNET.2013.6574666","volume":"27","author":"L Ming","year":"2013","unstructured":"Ming, L., Shucheng, Y., Kui, R., Wenjing, L., Thomas, H.Y.: Toward privacy-assured and searchable cloud data storage services. IEEE Netw. 27, 56\u201362 (2013)","journal-title":"IEEE Netw."},{"key":"9_CR8","unstructured":"Ann, C., Jeff, J.: Privacy by Design in the Age of Big Data. Information and Privacy Commissioner, Canada (2012)"},{"key":"9_CR9","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1109\/TETC.2015.2433923","volume":"4","author":"T Vicenc","year":"2016","unstructured":"Vicenc, T., Termeh, S., Julian, S.: Data protection for online social networks and P-Stability for graphs. IEEE Trans. Emerg. Top. Comput. 4, 374\u2013381 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"9_CR10","first-page":"46","volume":"28","author":"L Rongxing","year":"2014","unstructured":"Rongxing, L., Hui, Z., Ximeng, L., Joseph, K.L., Jun, S.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28, 46\u201350 (2014)","journal-title":"IEEE Netw."},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0304-3975(90)90164-D","volume":"73","author":"J Mark","year":"1990","unstructured":"Mark, J., Alistair, S.: Fast uniform generation of regular graphs. Theoret. Comput. Sci. 73, 91\u2013100 (1990)","journal-title":"Theoret. Comput. Sci."},{"key":"9_CR12","unstructured":"Jerrum, M., Sinclair, A., McKay, B.: When is a graphical sequence stable? In: Frieze, A., Luczak, T. (eds.) Random Graphs, vol. 2, pp. 101\u2013115. Wiley (1992)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Prabu Kanna, G., Vasudevan, V.: Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in cloud. In: Proceedings of the International Conference on Electrical, Electronics and Optimization Techniques (ICEEOT), pp. 3688\u20133693 (2016)","DOI":"10.1109\/ICEEOT.2016.7755398"}],"container-title":["Lecture Notes in Computer Science","Theoretical Computer Science and Discrete Mathematics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64419-6_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T22:57:52Z","timestamp":1750805872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64419-6_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644189","9783319644196"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64419-6_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}