{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:21:52Z","timestamp":1725538912926},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642044373"},{"type":"electronic","value":"9783642044380"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04438-0_33","type":"book-chapter","created":{"date-parts":[[2009,9,29]],"date-time":"2009-09-29T07:17:59Z","timestamp":1254208679000},"page":"388-400","source":"Crossref","is-referenced-by-count":5,"title":["Content Sharing Based on Personal Information in Virtually Secured Space"],"prefix":"10.1007","author":[{"given":"Hosik","family":"Sohn","sequence":"first","affiliation":[]},{"given":"Yong Man","family":"Ro","sequence":"additional","affiliation":[]},{"given":"Kostantinos N.","family":"Plataniotis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"OECD study on the Participative Web : User Generated Content (October 3, 2007), http:\/\/www.oecd.org","key":"33_CR1"},{"doi-asserted-by":"crossref","unstructured":"Ames, M., Naaman, M.: Why We Tag: Motivations for Annotation in Mobile and Online Media. In: CHI 2007, pp. 971\u2013980 (2007)","key":"33_CR2","DOI":"10.1145\/1240624.1240772"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TFUZZ.2006.889970","volume":"15","author":"V. Loia","year":"2007","unstructured":"Loia, V., Pedrycz, W., Senatore, S.: Semantic Web Content Analysis: A Study in Proximity-Based Collaborative Clustering. IEEE Trans. on Fuzzy Systems\u00a015, 1294\u20131312 (2007)","journal-title":"IEEE Trans. on Fuzzy Systems"},{"unstructured":"Youtube, http:\/\/www.youtube.com","key":"33_CR4"},{"unstructured":"Flickr, http:\/\/www.flickr.com\/","key":"33_CR5"},{"unstructured":"Myspace, http:\/\/www.myspace.com\/","key":"33_CR6"},{"unstructured":"Facebook, http:\/\/www.facebook.com\/","key":"33_CR7"},{"doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A., John Heinz III, H.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA, USA, pp. 71\u201380 (2005)","key":"33_CR8","DOI":"10.1145\/1102199.1102214"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., Sudan, M.: A fuzzy vault scheme. In: IEEE International Symposium, Information Theory, p. 408 (2002)","key":"33_CR9","DOI":"10.1109\/ISIT.2002.1023680"},{"issue":"4","key":"33_CR10","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1109\/TIFS.2007.908165","volume":"2","author":"K. Nandakumar","year":"2007","unstructured":"Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions Information Forensics and Security\u00a02(4), 744\u2013757 (2007)","journal-title":"IEEE Transactions Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Wang, Y., Plataniotis, K.N.: Fuzzy Vault for Face Based Cryptographic key Generation. In: Biometrics Symposium, September 2007, pp. 1\u20136 (2007)","key":"33_CR11","DOI":"10.1109\/BCC.2007.4430549"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/978-3-540-74549-5_84","volume-title":"Advances in Biometrics","author":"Y.J. Lee","year":"2007","unstructured":"Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., Kim, J.: Biometric key Binding: Fuzzy Vault Based on Iris Images. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.\u00a04642, pp. 800\u2013808. Springer, Heidelberg (2007)"},{"unstructured":"Wikipedia, List of hobbies, http:\/\/en.wikipedia.org\/wiki\/List_of_hobbies","key":"33_CR13"},{"unstructured":"U.S. Department of Labor, Bureau of Labor Statistics. Standard Occupational Classification(SOC) Major Groups, http:\/\/www.bls.gov\/soc\/soc_majo.htm","key":"33_CR14"},{"unstructured":"Wikipedia, List of films, http:\/\/en.wikipedia.org\/wiki\/Lists_of_films","key":"33_CR15"},{"unstructured":"NIST. Advanced Encryption Standard (AES) (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf","key":"33_CR16"},{"key":"33_CR17","volume-title":"Numerical Recipes in C","author":"W.H. Press","year":"1992","unstructured":"Press, W.H., Teukolsky, S.A., Vetterling, W.T., Flannery, B.P.: Numerical Recipes in C, 2nd edn. Cambridge University Press, Cambridge (1992)","edition":"2"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04438-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T18:37:05Z","timestamp":1558550225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04438-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642044373","9783642044380"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04438-0_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}