{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:54:48Z","timestamp":1730210088638,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,5]]},"DOI":"10.1109\/comsnets51098.2021.9352809","type":"proceedings-article","created":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T05:11:22Z","timestamp":1613711482000},"page":"465-473","source":"Crossref","is-referenced-by-count":0,"title":["Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data"],"prefix":"10.1109","author":[{"given":"Laltu","family":"Sardar","sequence":"first","affiliation":[]},{"given":"Gaurav","family":"Bansal","sequence":"additional","affiliation":[]},{"given":"Sushmita","family":"Ruj","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"CryptGraph: Privacy Preserving Graph Analytics on Encrypted Graph","volume":"abs 1409 5021","author":"xie","year":"2014","journal-title":"CoRR"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","article-title":"Structured encryption and controlled disclosure","author":"chase","year":"2010","journal-title":"Proceedings of ASIACRYPT 2010"},{"key":"ref12","first-page":"478","article-title":"Forward-secure searchable encryption on labeled bipartite graphs","author":"lai","year":"2017","journal-title":"Proceedings of ACNS 2017"},{"journal-title":"SNAP Datasets Stanford large network dataset collection","year":"2014","author":"leskovec","key":"ref13"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jnca.2016.09.010","article-title":"Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud","volume":"86","author":"liu","year":"2017","journal-title":"J Network and Computer Applications"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.30"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.07.082"},{"key":"ref17","article-title":"Graph encryption for all-path queries","volume":"32 16","author":"xu","year":"2020","journal-title":"Concur and Comput Prac and Exp"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329803"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2015.72"},{"key":"ref4","article-title":"Preserving Link Privacy in Social Network Based Systems","author":"mittal","year":"2013","journal-title":"Proceedings of the 2013 Network and Distributed System Security Symposium (NDSS)"},{"key":"ref3","first-page":"140","article-title":"Factors Influencing Organization Adoption Decision On Cloud Computing","volume":"2","author":"rahimli","year":"2013","journal-title":"International Journal of Cloud Computing and Services Science (LJ-CLOSER)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2019043"},{"key":"ref5","first-page":"303","article-title":"SecGraph: A Uniform and Open-source Evaluation System for Graph Data Anonymization and De-anonymization","author":"ji","year":"2015","journal-title":"Proceedings of the 2015 USENIX Security Symposium (USENIX Security)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813672"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2774451"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-017-0426-5"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"440 ep","DOI":"10.1038\/30918","article-title":"Collective dynamics of &#x2018;small-world&#x2019; networks","volume":"393","author":"watts","year":"1998","journal-title":"Nature"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/978-3-319-70972-7_5","article-title":"Secgdb: Graph encryption for exact shortest distance queries with efficient updates","author":"wang","year":"2017","journal-title":"Proceedings of Financial Cryptography and Data Security - FC 2017"},{"key":"ref20","article-title":"Towards Search on Encrypted Graph Data","volume":"1121","author":"kasten","year":"2013","journal-title":"Proceedings of ISWC 2013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.84"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.23032"},{"key":"ref23","article-title":"Prototypes of the graph encryption scheme supporting clustering coefficient query","author":"bansal","year":"0","journal-title":"Dropbox repository"}],"event":{"name":"2021 International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2021,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2021,1,9]]}},"container-title":["2021 International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9352735\/9352808\/09352809.pdf?arnumber=9352809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:39:19Z","timestamp":1643265559000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9352809\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/comsnets51098.2021.9352809","relation":{},"subject":[],"published":{"date-parts":[[2021,1,5]]}}}