{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:07:55Z","timestamp":1743041275376,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545672"},{"type":"electronic","value":"9783642545689"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54568-9_6","type":"book-chapter","created":{"date-parts":[[2014,3,20]],"date-time":"2014-03-20T14:31:35Z","timestamp":1395325895000},"page":"83-99","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy Analysis of a Hidden Friendship Protocol"],"prefix":"10.1007","author":[{"given":"Florian","family":"Kamm\u00fcller","sequence":"first","affiliation":[]},{"given":"S\u00f6ren","family":"Preibusch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,21]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281\u2013285. Springer, Heidelberg (2005). http:\/\/www.avispa-project.org\/publications.html","DOI":"10.1007\/11513988_27"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/0020-0190(95)00144-2","volume":"56","author":"G Lowe","year":"1995","unstructured":"Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Inf. Process. Lett. 56, 131\u2013133 (1995)","journal-title":"Inf. Process. Lett."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8, 18\u201336 (1990)","journal-title":"ACM Trans. Comput. Syst."},{"key":"6_CR4","unstructured":"Brickley, D., Miller, L.: FOAF Vocabulary Specification 0.97. Namespace document, January 2010"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Preibusch, S.: The privacy jungle: on the market for data protection in social networks. In: The Ninth Workshop on the Economics of Information Security (WEIS 09), March 2009","DOI":"10.1007\/978-1-4419-6967-5_8"},{"key":"6_CR6","unstructured":"Blanchet, B., Smyth, B.: ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial (2011)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Cohen, M., Dam, M.: A complete axiomatization of knowledge and cryptography. In: Proceedings of the 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 10\u201312 July 2007, Wroclaw, Poland, pp. 77\u201388. IEEE Computer Society (2007)","DOI":"10.1109\/LICS.2007.4"},{"key":"6_CR8","unstructured":"Dam, M.: A little knowledge goes a bit further. invited talk. In: Annual Meeting of Priority Program RS3 \u2013 Reliably Secure Software Systems (2011)"},{"key":"6_CR9","unstructured":"Facebook. Updates on your new privacy tools (2009)"},{"key":"6_CR10","unstructured":"Federated Social Web Europe. Federated social architectures and protocols, privacy on the federated social web (2011)"},{"key":"6_CR11","unstructured":"FOAF project. The Friend of a Friend (FOAF) project (2010)"},{"key":"6_CR12","unstructured":"Kamm\u00fcller, F., Mapp, G., Patel, S., Sani, A.S.: Engineering security pro tocols with modelchecking \u2013 radius-sha256 and secured simple protocol. In: International Conference on Internet Monitoring and Protection, ICIMP\u201912 (2012)"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Kamm\u00fcller, F., Probst, C.W.: Invalidating policies using structural information. In: Workshop on Research in Insider Threats WRIT\u201913 - IEEE CS Security and Privacy Workshops, SPW (2013)","DOI":"10.1109\/SPW.2013.36"},{"key":"6_CR14","series-title":"LNCS","first-page":"682","volume-title":"CAV 2009","author":"A Lomuscio","year":"2009","unstructured":"Lomuscio, A., Qu, H., Raimondi, F.: MCMAS: a model checker for the verification of multi-agent systems. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol. 5643, pp. 682\u2013688. Springer, Heidelberg (2009)"},{"key":"6_CR15","unstructured":"MySpace. Profile 2.0 launch - check it out :) (2008)"},{"key":"6_CR16","unstructured":"Preibusch, S., Beresford, A.R.: Establishing distributed hidden\u00a0friendship relations. In: Seventeenth International Workshop on Security Protocols (2009)"},{"key":"6_CR17","unstructured":"Stanford Encyclopedia of Philosophy. Epistemic logic (2006)"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1145\/1526709.1526781","volume-title":"In: Proceedings of the 18th International Conference on World Wide Web (WWW \u201909)","author":"E Zheleva","year":"2009","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web (WWW \u201909), pp. 531\u2013540. ACM, New York (2009)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Autonomous Spontaneous Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54568-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T12:16:37Z","timestamp":1676376997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54568-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545672","9783642545689"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54568-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"21 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}