{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:10:46Z","timestamp":1725761446936},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642450648"},{"type":"electronic","value":"9783642450655"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-45065-5_24","type":"book-chapter","created":{"date-parts":[[2013,12,4]],"date-time":"2013-12-04T03:55:42Z","timestamp":1386129342000},"page":"466-484","source":"Crossref","is-referenced-by-count":2,"title":["AnonyLikes: Anonymous Quantitative Feedback on Social Networks"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Alves","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335\u2013348 (2008)","key":"24_CR1"},{"doi-asserted-by":"crossref","unstructured":"Al-Ani, B., Mark, G., Chung, J., Jones, J.: The Egyptian blogosphere: a counter-narrative of the revolution. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (2012)","key":"24_CR2","DOI":"10.1145\/2145204.2145213"},{"unstructured":"Benaloh, J.: Verifiable secret-ballot elections. PhD thesis, Yale University (1987)","key":"24_CR3"},{"doi-asserted-by":"crossref","unstructured":"Beresford, A., Stajano, F.: Location privacy in pervasive computing. In: IEEE Pervasive Computing (2005)","key":"24_CR4","DOI":"10.1007\/978-3-540-39881-3_3"},{"issue":"2","key":"24_CR5","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D. Chaum","year":"1981","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto (1982)","key":"24_CR6","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-45961-8_15","volume-title":"Advances in Cryptology - EUROCRYPT \u201988","author":"D. Chaum","year":"1988","unstructured":"Chaum, D.: Elections with unconditionally-secret ballots and disruption equivalent to breaking RSA. In: G\u00fcnther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol.\u00a0330, pp. 177\u2013182. Springer, Heidelberg (1988)"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/3-540-48658-5_19","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"R. Cramer","year":"1994","unstructured":"Cramer, R., Damg\u00e5rd, I.B., Schoenmakers, B.: Proof of partial knowledge and simplified design of witness hiding protocols. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 174\u2013187. Springer, Heidelberg (1994)"},{"issue":"5","key":"24_CR9","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1002\/ett.4460080506","volume":"8","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications\u00a08(5), 481\u2013490 (1997)","journal-title":"European Transactions on Telecommunications"},{"doi-asserted-by":"crossref","unstructured":"Cristofaro, E.D., Soriente, C.: Hummingbird: Privacy at the time of twitter. In: 2012 IEEE Symposium on Security and Privacy (SP), vol.\u00a01692, pp. 285\u2013299 (2012)","key":"24_CR10","DOI":"10.1109\/SP.2012.26"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y.G. Desmedt","year":"1990","unstructured":"Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"issue":"15","key":"24_CR12","doi-asserted-by":"publisher","first-page":"3007","DOI":"10.1016\/j.comnet.2008.06.017","volume":"52","author":"J. Domingo-Ferrer","year":"2008","unstructured":"Domingo-Ferrer, J., Viejo, A., Seb\u00e9, F., Gonz\u00e1lez-Nicol\u00e1s, U.: Privacy homomorphisms for social networks with private relationships. Computer Networks\u00a052(15), 3007\u20133016 (2008)","journal-title":"Computer Networks"},{"doi-asserted-by":"crossref","unstructured":"Dong, W., Dave, V., Qiu, L., Zhang, Y.: Secure friend discovery in mobile social networks. In: 2011 Proceedings IEEE INFOCOM, pp. 1647\u20131655 (April 2011)","key":"24_CR13","DOI":"10.1109\/INFCOM.2011.5934958"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-57220-1_66","volume-title":"Advances in Cryptology - AUSCRYPT \u201992","author":"A. Fujioka","year":"1993","unstructured":"Fujioka, A., Okamoto, T., Ohta, K.: A practical secret voting scheme for large scale elections. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol.\u00a0718, pp. 244\u2013251. Springer, Heidelberg (1993)"},{"key":"24_CR16","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1016\/j.cose.2012.10.001","volume":"32","author":"R. Joaquim","year":"2013","unstructured":"Joaquim, R., Ferreira, P., Ribeiro, C.: EVIV: An end-to-end verifiable Internet voting system. Computers & Security\u00a032, 170\u2013191 (2013)","journal-title":"Computers & Security"},{"doi-asserted-by":"crossref","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 61\u201370 (2005)","key":"24_CR17","DOI":"10.1145\/1102199.1102213"},{"key":"24_CR18","series-title":"LNCS","first-page":"245","volume-title":"ICISC 2003","author":"B. Lee","year":"2004","unstructured":"Lee, B., Boyd, C., Dawson, E., Kim, K., Yang, J., Yoo, S.: Providing receipt-freeness in mixnet-based voting protocols. In: Lim, J.I., Lee, D.H. (eds.) ICISC 2003. LNCS, vol.\u00a02971, pp. 245\u2013258. Springer, Heidelberg (2004)"},{"doi-asserted-by":"crossref","unstructured":"Li, M., Cao, N., Yu, S., Lou, W.: FindU: Privacy-preserving personal profile matching in mobile social networks. In: 2011 Proceedings IEEE INFOCOM, pp. 2435\u20132443 (April 2011)","key":"24_CR19","DOI":"10.1109\/INFCOM.2011.5935065"},{"key":"24_CR20","first-page":"1375","volume":"5","author":"G. Lotan","year":"2011","unstructured":"Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., Boyd, D.: The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions. International Journal of Communication\u00a05, 1375\u20131406 (2011)","journal-title":"International Journal of Communication"},{"doi-asserted-by":"crossref","unstructured":"Monroy-Hern\u00e1ndez, A.: The new war correspondents: he rise of civic media curation in urban warfare. In: Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work, pp. 1443\u20131452 (2013)","key":"24_CR21","DOI":"10.1145\/2441776.2441938"},{"unstructured":"Olaore, O.: Politexting: Using Mobile Technology to Connect the Unconnected and Expanding the Scope of Political Communication. In: Information Systems Educators Conference 2011 ISECON Proceedings, pp. 1\u20138 (2011)","key":"24_CR22"},{"unstructured":"Rivest, R.: On data banks and privacy homomorphisms. Foundations of Secure Computation\u00a04(11) (1978)","key":"24_CR23"},{"doi-asserted-by":"crossref","unstructured":"Wulf, V., Misaki, K., Atam, M.: On the ground\u2019in Sidi Bouzid: investigating social media use during the tunisian revolution. In: Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work, pp. 1409\u20131418 (2013)","key":"24_CR24","DOI":"10.1145\/2441776.2441935"}],"container-title":["Lecture Notes in Computer Science","Middleware 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-45065-5_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T03:05:59Z","timestamp":1558753559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-45065-5_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642450648","9783642450655"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-45065-5_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}