{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:45:06Z","timestamp":1725749106798},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642407789"},{"type":"electronic","value":"9783642407796"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40779-6_15","type":"book-chapter","created":{"date-parts":[[2013,9,16]],"date-time":"2013-09-16T11:32:11Z","timestamp":1379331131000},"page":"173-184","source":"Crossref","is-referenced-by-count":3,"title":["Hiding Information in Social Networks from De-anonymization Attacks by Using Identity Separation"],"prefix":"10.1007","author":[{"given":"G\u00e1bor Gy\u00f6rgy","family":"Guly\u00e1s","sequence":"first","affiliation":[]},{"given":"S\u00e1ndor","family":"Imre","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","first-page":"173","volume-title":"30th IEEE Symposium on Security and Privacy","author":"A. Narayanan","year":"2009","unstructured":"Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: 30th IEEE Symposium on Security and Privacy, pp. 173\u2013187. IEEE Press, New York (2009)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/IJCNN.2011.6033446","volume-title":"The 2011 International Joint Conference on Neural Networks","author":"A. Narayanan","year":"2011","unstructured":"Narayanan, A., Shi, E., Rubinstein, B.I.P.: Link prediction by de-anonymization: How we won the kaggle social network challenge. In: The 2011 International Joint Conference on Neural Networks, pp. 1825\u20131834. IEEE Press, New York (2011)"},{"key":"15_CR3","first-page":"587","volume-title":"9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks","author":"W. Peng","year":"2012","unstructured":"Peng, W., Li, F., Zou, X., Wu, J.: Seed and Grow: An attack against anonymized social networks. In: 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp. 587\u2013595. IEEE Press, New York (2012)"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1145\/2382196.2382262","volume-title":"2012 ACM Conference on Computer and Communications Security","author":"M. Srivatsa","year":"2012","unstructured":"Srivatsa, M., Hicks, M.: Deanonymizing mobility traces: Using social network as a side-channel. In: 2012 ACM Conference on Computer and Communications Security, pp. 628\u2013637. ACM Press, New York (2012)"},{"issue":"4","key":"15_CR5","first-page":"11","volume":"III","author":"G.G. Guly\u00e1s","year":"2011","unstructured":"Guly\u00e1s, G.G., Imre, S.: Analysis of Identity Separation Against a Passive Clique-Based De-anonymization Attack. Infocommunications Journal\u00a0III(4), 11\u201320 (2011)","journal-title":"Infocommunications Journal"},{"issue":"12","key":"15_CR6","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L.A. Cutillo","year":"2009","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a Privacy Preserving Online Social Network Leveraging on Real-Life Trust. IEEE Communications Magazine\u00a047(12), 94\u2013101 (2009)","journal-title":"IEEE Communications Magazine"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Beato, F., Conti, M., Preneel, B.: Friend in the Middle (FiM): Tackling De-Anonymization in Social Networks. In: 5th IEEE International Workshop on Security and Social Networking (2013)","DOI":"10.1109\/PerComW.2013.6529495"},{"key":"15_CR8","first-page":"83","volume-title":"2005 Workshop on Digital Identity Management","author":"S. Clau\u00df","year":"2005","unstructured":"Clau\u00df, S., Kesdogan, D., K\u00f6lsch, T.: Privacy enhancing identity management: protection against re-identification and profiling. In: 2005 Workshop on Digital Identity Management, pp. 83\u201394. ACM Press, New York (2005)"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/ICDMW.2012.87","volume-title":"12th International Conference on Data Mining Workshops","author":"G.G. Guly\u00e1s","year":"2012","unstructured":"Guly\u00e1s, G.G., Imre, S.: Measuring Local Topological Anonymity in Social Networks. In: 12th International Conference on Data Mining Workshops, pp. 563\u2013570. IEEE Press, New York (2012)"},{"key":"15_CR10","unstructured":"Stanford Large Network Dataset Collection, \n                      \n                        http:\/\/snap.stanford.edu\/data\/index.html"},{"key":"15_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/1242572.1242598","volume-title":"16th International Conference on World Wide Web","author":"L. Backstrom","year":"2007","unstructured":"Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: 16th International Conference on World Wide Web, pp. 181\u2013190. ACM Press, New York (2007)"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40779-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T10:02:20Z","timestamp":1558087340000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40779-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642407789","9783642407796"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40779-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}