{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:51:26Z","timestamp":1725742286564},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642400988"},{"type":"electronic","value":"9783642400995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40099-5_34","type":"book-chapter","created":{"date-parts":[[2013,7,24]],"date-time":"2013-07-24T16:32:17Z","timestamp":1374683537000},"page":"410-424","source":"Crossref","is-referenced-by-count":3,"title":["Automatic Anonymous Fingerprinting of Text Posted on Social Networking Services"],"prefix":"10.1007","author":[{"given":"Hoang-Quoc","family":"Nguyen-Son","sequence":"first","affiliation":[]},{"given":"Minh-Triet","family":"Tran","sequence":"additional","affiliation":[]},{"given":"Dung Tran","family":"Tien","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Yoshiura","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Sonehara","sequence":"additional","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"Arnold, M., Schmucker, M., Wolthusen, S.: Techniques and applications of digital watermarking and content protection. Artech House Publishers (2003)"},{"issue":"4","key":"34_CR2","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"N. Ellison","year":"2007","unstructured":"Ellison, N., Steinfield, C., Lampe, C.: The benefits of Facebook \u201cfriends\u201d: Social capital and college students\u2019 use of online social network sites. Journal of Computer-Mediated Communication\u00a012(4), 1143\u20131168 (2007)","journal-title":"Journal of Computer-Mediated Communication"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71\u201380. ACM Press (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"2","key":"34_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2008.41","volume":"6","author":"M. Hansen","year":"2008","unstructured":"Hansen, M., Schwartz, A., Cooper, A.: Privacy and identity management. IEEE Security and Privacy Magazine\u00a06(2), 38\u201345 (2008)","journal-title":"IEEE Security and Privacy Magazine"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Joshi, P., Kuo, C.C.: Security and privacy in online social networks: A survey. In: Proceedings of the IEEE International Conference on Multimedia and Expo (2011)","DOI":"10.1109\/ICME.2011.6012166"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-642-17773-6_23","volume-title":"Security Protocols","author":"H. Kataoka","year":"2010","unstructured":"Kataoka, H., Utsumi, A., Hirose, Y., Yoshiura, H.: Disclosure control of natural language information to enable secure and enjoyable communication over the internet. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2007. LNCS, vol.\u00a05964, pp. 178\u2013188. Springer, Heidelberg (2010)"},{"key":"34_CR7","unstructured":"Madden, M., Smith, A.: Reputation Management and Social Media (2010), \n                      \n                        http:\/\/pewinternet.org\/~\/media\/\/Files\/Reports\/2010\/PIP_Reputation_Management.pdf"},{"issue":"11","key":"34_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/219717.219748","volume":"38","author":"G. Miller","year":"1995","unstructured":"Miller, G., et al.: Wordnet: a lexical database for english. Communications of the ACM\u00a038(11), 39\u201341 (1995)","journal-title":"Communications of the ACM"},{"key":"34_CR9","doi-asserted-by":"crossref","unstructured":"Samarati, P., Sweeney, L.: Generalizing data to provide anonymity when disclosing information. In: Proceedings of the 17th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, vol. 17, pp. 188\u2013188. ACM (1998)","DOI":"10.1145\/275487.275508"},{"key":"34_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/978-3-642-32205-1_35","volume-title":"Digital Forensics and Watermarking","author":"S. Schrittwieser","year":"2012","unstructured":"Schrittwieser, S., Kieseberg, P., Echizen, I., Wohlgemuth, S., Sonehara, N., Weippl, E.: An algorithm for k-anonymity-based fingerprinting. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol.\u00a07128, pp. 439\u2013452. Springer, Heidelberg (2012)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Suchanek, F., Kasneci, G., Weikum, G.: YAGO: a core of semantic knowledge. In: Proceedings of the 16th International Conference on World Wide Web (WWW), pp. 697\u2013706. ACM Press (2007)","DOI":"10.1145\/1242572.1242667"},{"key":"34_CR12","unstructured":"Ullyot, T.: Facebook Current Report, Form 8-K, Filing Date July 26, 2012 (2012), \n                      \n                        http:\/\/pdf.secdatabase.com\/700\/0001193125-12-316895.pdf"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Vokel, M., Krotzsch, M., Vrandecic, D., Haller, H., Studer, R.: Semantic Wikipedia. In: Proceedings of the 15th International Conference on World Wide Web (2006)","DOI":"10.1145\/1135777.1135863"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Xu, J., Wang, W., Pei, J., Wang, X., Shi, B., Fu, A.: Utility-based anonymization using local recoding. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785\u2013790. ACM (2006)","DOI":"10.1145\/1150402.1150504"},{"key":"34_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/978-3-642-03688-0_16","volume-title":"Digital Watermarking","author":"X. Zheng","year":"2009","unstructured":"Zheng, X., Huang, L., Chen, Z., Yu, Z., Yang, W.: Hiding information by context-based synonym substitution. In: Ho, A.T.S., Shi, Y.Q., Kim, H.J., Barni, M. (eds.) IWDW 2009. LNCS, vol.\u00a05703, pp. 162\u2013169. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermaking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40099-5_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T03:20:59Z","timestamp":1557976859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40099-5_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642400988","9783642400995"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40099-5_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}