{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:36:49Z","timestamp":1730209009227,"version":"3.28.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/cns.2017.8228712","type":"proceedings-article","created":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T00:55:49Z","timestamp":1513904149000},"page":"45-457","source":"Crossref","is-referenced-by-count":0,"title":["Towards a new privacy-preserving social media advertising architecture (invited position paper)"],"prefix":"10.1109","author":[{"given":"Daniela","family":"Becker","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Guajardo","sequence":"additional","affiliation":[]},{"given":"Karl-Heinz","family":"Zimmermann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Rise of Data-driven Affiliate Marketing","year":"0","author":"kmet","key":"ref4"},{"key":"ref3","article-title":"Successful Affiliate Marketing for Merchants","author":"fiore","year":"2001","journal-title":"Que Corp Indianapolis IN USA"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.47.4.643"},{"journal-title":"Forbes Top Influencers Meet The 30 Power Players Making A Fortune On Social Media","year":"0","author":"o'connor","key":"ref6"},{"key":"ref5","first-page":"1","article-title":"Increasing the ROI of Social Media Marketing","author":"kumar","year":"2012","journal-title":"MIT Sloan Management Review"},{"key":"ref8","first-page":"1","volume":"56","author":"regev","year":"2009","journal-title":"On lattices learning with errors random linear codes and cryptography Journal of the ACM (JACM)"},{"journal-title":"How Do You Market To Millennials? - new boom","year":"2015","author":"radio","key":"ref7"},{"journal-title":"The Business Of Social Media","year":"2011","author":"bennett","key":"ref2"},{"key":"ref9","article-title":"Privacy-Preserving Aggregation of Time-Series Data","author":"shi","year":"2011","journal-title":"NDSS"},{"key":"ref1","article-title":"Revisiting Private Stream Aggregation: Post-Quantum Secure PSA","author":"becker","year":"2017","journal-title":"Under submission"}],"event":{"name":"2017 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2017,10,9]]},"location":"Las Vegas, NV","end":{"date-parts":[[2017,10,11]]}},"container-title":["2017 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8170165\/8228604\/08228712.pdf?arnumber=8228712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:02:23Z","timestamp":1580688143000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8228712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/cns.2017.8228712","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}