{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:20:57Z","timestamp":1725679257854},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642298882"},{"type":"electronic","value":"9783642298899"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29889-9_5","type":"book-chapter","created":{"date-parts":[[2012,5,9]],"date-time":"2012-05-09T10:21:35Z","timestamp":1336558895000},"page":"40-54","source":"Crossref","is-referenced-by-count":6,"title":["Cryptographic Treatment of Private User Profiles"],"prefix":"10.1007","author":[{"given":"Felix","family":"G\u00fcnther","sequence":"first","affiliation":[]},{"given":"Mark","family":"Manulis","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 135\u2013146 (2009)","DOI":"10.1145\/1594977.1592585"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/11889663_4","volume-title":"Financial Cryptography and Data Security","author":"A. Barth","year":"2006","unstructured":"Barth, A., Boneh, D., Waters, B.: Privacy in Encrypted Content Distribution using Private Broadcast Encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol.\u00a04107, pp. 52\u201364. Springer, Heidelberg (2006)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (S&P 2007), pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Buchegger, S., Schi\u00f6berg, D., Vu, L.-H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: ACM EuroSys Workshop on Social Network Systems (SNS 2009), pp. 46\u201352 (2009)","DOI":"10.1145\/1578002.1578010"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finney, H., Shaw, D., Thayer, R.: OpenPGP Message Format. RFC 4880, Informational (2007)","DOI":"10.17487\/rfc4880"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOM 1999, pp. 708\u2013716 (1999)","DOI":"10.1109\/INFCOM.1999.751457"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Transactions on Information and System Security\u00a013(1) (2009)","DOI":"10.1145\/1609956.1609962"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine\u00a047(12) (2009); Consumer Communications and Networking Series","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-01001-9_10","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"C. Gentry","year":"2009","unstructured":"Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 171\u2013188. Springer, Heidelberg (2009)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Gjoka, M., Kurant, M., Butts, C.T., Markopoulou, A.: Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. In: INFOCOM 2010, pp. 2498\u20132506 (2010)","DOI":"10.1109\/INFCOM.2010.5462078"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Golder, S.A., Wilkinson, D.M., Huberman, B.A.: Rhythms of social interaction: Messaging within a massive online network. In: Communities and Technologies 2007, pp. 41\u201366 (2007)","DOI":"10.1007\/978-1-84628-905-7_3"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical security in p2p-based social networks. In: Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 269\u2013272 (2009)","DOI":"10.1109\/LCN.2009.5355085"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A distributed platform for multimedia communities. In: IEEE International Symposium on Multimedia (ISM 2008), pp. 208\u2013213 (2008)","DOI":"10.1109\/ISM.2008.11"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society (WPES 2005), pp. 71\u201380 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"5_CR15","unstructured":"G\u00fcnther, F., Manulis, M., Strufe, T.: Cryptographic Treatment of Private User Profiles. Cryptology ePrint Archive, Report 2011\/064 (2011), \n                      \n                        http:\/\/eprint.iacr.org\/2011\/064"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based access control in social networks with efficient revocation. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 411\u2013415 (2011)","DOI":"10.1145\/1966913.1966970"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Lucas, M.M., Borisov, N.: flyByNight: mitigating the privacy risks of social networking. In: Symposium on Usable Privacy and Security, SOUPS 2009 (2009)","DOI":"10.1145\/1572532.1572577"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, P.K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: ACM SIGCOMM Conference on Internet Measurement 2007, pp. 29\u201342 (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"5_CR19","unstructured":"PrimeLife. Scramble! (September 2010), \n                      \n                        http:\/\/www.primelife.eu\/results\/opensource\/65-scramble"},{"issue":"5","key":"5_CR20","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"A.T. Sherman","year":"2003","unstructured":"Sherman, A.T., McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Transactions on Software Engineering\u00a029(5), 444\u2013458 (2003)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009), pp. 169\u2013180 (2009)","DOI":"10.1145\/1658939.1658959"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. RFC 2627, Informational (1999)","DOI":"10.17487\/rfc2627"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 1998, pp. 68\u201379 (1998)","DOI":"10.1145\/285243.285260"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: International Conference on World Wide Web (WWW 2009), pp. 531\u2013540 (2009)","DOI":"10.1145\/1526709.1526781"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Hu, Z., Wang, H., Hu, H., Ahn, G.-J.: A Collaborative Framework for Privacy Protection in Online Social Networks. In: International Conference on Collaborative Computing (CollaborateCom 2010) (2010)","DOI":"10.4108\/icst.collaboratecom.2010.52"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29889-9_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:19:59Z","timestamp":1620112799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29889-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642298882","9783642298899"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29889-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}