{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:06Z","timestamp":1773511146258,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642222627","type":"print"},{"value":"9783642222634","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22263-4_1","type":"book-chapter","created":{"date-parts":[[2011,7,18]],"date-time":"2011-07-18T17:34:45Z","timestamp":1311010485000},"page":"1-17","source":"Crossref","is-referenced-by-count":112,"title":["How Unique and Traceable Are Usernames?"],"prefix":"10.1007","author":[{"given":"Daniele","family":"Perito","sequence":"first","affiliation":[]},{"given":"Claude","family":"Castelluccia","sequence":"additional","affiliation":[]},{"given":"Mohamed Ali","family":"Kaafar","sequence":"additional","affiliation":[]},{"given":"Pere","family":"Manils","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Scrapers dig deep for data on web, http:\/\/online.wsj.com\/article\/SB1000142405274870335804575544381288117888.html"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15512-3_22","volume-title":"Recent Advances in Intrusion Detection","author":"M. Balduzzi","year":"2010","unstructured":"Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing social networks for automated user profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol.\u00a06307, Springer, Heidelberg (2010)"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International World Wide Web Conference, pp. 551\u2013560 (2009)","DOI":"10.1145\/1526709.1526784"},{"key":"1_CR4","unstructured":"Cohen, W.W., Ravikumar, P., Fienberg, S.E.: A comparison of string distance metrics for name-matching tasks. In: Proceeding of IJCAI 2003 Workshop on Information Integrtation, pp. 73\u201378 (August 2003)"},{"key":"1_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of information theory","author":"T.M. Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of information theory. Wiley-Interscience, New York (1991)"},{"key":"1_CR6","unstructured":"Dell\u2019Amico, M., Michiardi, P., Roudier, Y.: Measuring password strength: An empirical analysis"},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Privacy Enhancing Technologies","author":"P. Eckersley","year":"2010","unstructured":"Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol.\u00a06205, pp. 1\u201318. Springer, Heidelberg (2010)"},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2007.250581","volume":"19","author":"A.K. Elmagarmid","year":"2007","unstructured":"Elmagarmid, A.K., Ipeirotis, P.G., Verykios, V.S.: Duplicate record detection: A survey. IEEE Transactions on Knowledge and Data Engineering\u00a019, 1\u201316 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"1_CR9","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/CSE.2009.459","volume-title":"CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering","author":"D. Irani","year":"2009","unstructured":"Irani, D., Webb, S., Li, K., Pu, C.: Large online social footprints\u2013an emerging threat. In: CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 271\u2013276. IEEE Computer Society Press, Washington, DC, USA (2009)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/eb026526","volume":"28","author":"K.S. Jones","year":"1972","unstructured":"Jones, K.S.: A statistical interpretation of term specificity and its application in retrieval. Journal of Documentation\u00a028, 11\u201321 (1972)","journal-title":"Journal of Documentation"},{"key":"1_CR11","unstructured":"jr. Hussey. M.P., Baranov, P., McArdle, T., Boesenberg, T., Duggal, B.: personal information aggregator. Patent application number\u00a020100010993 (2010), http:\/\/www.faqs.org\/patents\/app\/20100010993."},{"key":"1_CR12","volume-title":"Foundations of Statistical Natural Language Processing","author":"C.D. Manning","year":"1999","unstructured":"Manning, C.D., Schuetze, H.: Foundations of Statistical Natural Language Processing, 1st edn. The MIT Press, Cambridge (1999)","edition":"1"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Narayanan, A.: Fast dictionary attacks on passwords using time-space tradeoff. In: ACM Conference on Computer and Communications Security, pp. 364\u2013372. ACM Press (2005)","DOI":"10.1145\/1102120.1102168"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks, pp. 173\u2013187. IEEE Computer Society Press, Los Alamitos","DOI":"10.1109\/SP.2009.22"},{"key":"1_CR15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"C.E. Shannon","year":"1951","unstructured":"Shannon, C.E.: Prediction and entropy of printed english. Bell Systems Technical Journal\u00a030, 50\u201364 (1951)","journal-title":"Bell Systems Technical Journal"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1328854.1328855","volume":"36","author":"S. Tata","year":"2007","unstructured":"Tata, S., Patel, J.M.: Estimating the selectivity of tf-idf based cosine similarity predicates. SIGMOD Rec.\u00a036(6), 7\u201312 (2007)","journal-title":"SIGMOD Rec."},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","first-page":"646","volume-title":"Advances in Cryptology - EUROCRYPT 2003","author":"L. Ahn von","year":"2003","unstructured":"von Ahn, L., Blum, M., Hopper, N., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 646\u2013646. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22263-4_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:33:26Z","timestamp":1741322006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22263-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222627","9783642222634"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22263-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}