{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:24:49Z","timestamp":1742912689930,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319715001"},{"type":"electronic","value":"9783319715018"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71501-8_12","type":"book-chapter","created":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T07:46:46Z","timestamp":1511250406000},"page":"210-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mutual Friend Attack Prevention in Social Network Data Publishing"],"prefix":"10.1007","author":[{"given":"Kamalkumar R.","family":"Macwan","sequence":"first","affiliation":[]},{"given":"Sankita J.","family":"Patel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,22]]},"reference":[{"key":"12_CR1","unstructured":"Facebookstatistics: http:\/\/nvestor.fb.com\/ Accessed on May 2017"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/1540276.1540279","volume":"10","author":"B Zhou","year":"2008","unstructured":"Zhou, B., Pei, J., Luk, W.S.: A brief survey on anonymization techniques for privacy preserving publishing of social network data. ACM Sigkdd Explor. Newsl. 10(2), 12\u201322 (2008)","journal-title":"ACM Sigkdd Explor. Newsl."},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-1-4419-6045-0_14","volume-title":"Managing and Mining Graph Data","author":"X Wu","year":"2010","unstructured":"Wu, X., Ying, X., Liu, K., Chen, L.: A survey of privacy-preservation of graphs and social networks. In: Aggarwal, C., Wang, H. (eds.) Managing and Mining Graph Data, pp. 421\u2013453. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-1-4419-6045-0_14"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Liu, K., Das, K., Grandison, T., Kargupta, H.: Privacy-preserving data analysis on graphs and social networks, In: Next Generation Data Mining, pp. 415\u2013431. CRC Press (2008)","DOI":"10.1201\/9781420085877.ch21"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, pp. 93\u2013106. ACM (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? Anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, pp. 181\u2013190. ACM (2007)","DOI":"10.1145\/1242572.1242598"},{"issue":"1","key":"12_CR7","doi-asserted-by":"publisher","first-page":"102","DOI":"10.14778\/1453856.1453873","volume":"1","author":"M Hay","year":"2008","unstructured":"Hay, M., Miklau, G., Jensen, D., Towsley, D., Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endowment 1(1), 102\u2013114 (2008)","journal-title":"Proc. VLDB Endowment"},{"issue":"05","key":"12_CR8","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: K-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"issue":"2","key":"12_CR9","first-page":"71","volume":"7","author":"W Xindong","year":"2014","unstructured":"Xindong, W., Zhu, X., Gong-Qing, W., Ding, W.: Privacy preserving social network publication against mutual friend attacks. IEEE Trans. Data Priv. 7(2), 71\u201377 (2014)","journal-title":"IEEE Trans. Data Priv."},{"key":"12_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, Security, and Trust in KDD","author":"E Zheleva","year":"2008","unstructured":"Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Ferrari, E., Malin, B., Saygin, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 153\u2013171. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-78478-4_9"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Zhou, B., Pei, J.: Preserving privacy in social networks against neighborhood attacks. In: 2008 IEEE 24th International Conference on Data Engineering, pp. 506\u2013515. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497459"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"He, X., Vaidya, J., Shafiq, B., Adam, N., Atluri, V.: Preserving privacy in social networks: a structure-aware approach. In: Web Intelligence and Intelligent Agent Technologies, WI-IAT 2009. IEEE\/WIC\/ACM International Joint Conferences on, vol. 1, pp. 647\u2013654. IET (2009)","DOI":"10.1109\/WI-IAT.2009.108"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Ying, X., Wu, X.: Randomizing social networks: a spectrum preserving approach. In: Proceedings of the 2008 SIAM International Conference on Data Mining, pp. 739\u2013750. SIAM (2008)","DOI":"10.1137\/1.9781611972788.67"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"946","DOI":"10.14778\/1687627.1687734","volume":"2","author":"L Zou","year":"2009","unstructured":"Zou, L., Chen, L., Tamer \u00d6zsu, M.: K-automorphism: a general framework for privacy preserving network publication. Proc. VLDB Endowment 2(1), 946\u2013957 (2009)","journal-title":"Proc. VLDB Endowment"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Zhang, L., Zhang, W.: Edge anonymity in social network graphs. In: International Conference on Computational Science and Engineering CSE 2009, vol. 4, pp. 1\u20138. IEEE (2009)","DOI":"10.1109\/CSE.2009.310"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Tai, C.-H., Yu, P.S., Yang, D.-N., Chen, M.-S.: Privacy-preserving social network publication against friendship attacks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1262\u20131270. ACM (2011)","DOI":"10.1145\/2020408.2020599"},{"key":"12_CR17","unstructured":"Networkx: http:\/\/networkx.lanl.gov\/ Accessed on Mar 2017"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Cheng, J., Fu, A.W., Liu, J.: K-isomorphism: privacy preserving network publication against structural attacks. In: Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pp. 459\u2013470. ACM (2010)","DOI":"10.1145\/1807167.1807218"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Tai, C.-H., Yu, P.S., Yang, D.-N., Chen, M.-S.: Structural diversity for privacy in publishing social networks. In: Proceedings of the 2011 SIAM International Conference on Data Mining, pp. 35\u201346. SIAM (2011)","DOI":"10.1137\/1.9781611972818.4"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Applied Cryptography Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71501-8_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T13:49:47Z","timestamp":1709819387000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-71501-8_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319715001","9783319715018"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71501-8_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"22 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPACE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy, and Applied Cryptography Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Goa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"space2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.space.dbcegoa.ac.in\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}