{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:42:18Z","timestamp":1725565338799},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883904","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"3746-3752","source":"Crossref","is-referenced-by-count":0,"title":["An additional protection layer for confidential OSNs posts"],"prefix":"10.1109","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Hauptmann","sequence":"additional","affiliation":[]},{"given":"Stefanie","family":"Roos","sequence":"additional","affiliation":[]},{"given":"Thorsten","family":"Strufe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1526709.1526784"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/SFCS.1997.646128"},{"year":"2013","author":"armknecht","journal-title":"Protecting Public OSN Posts from Unintended Access","key":"18"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/j.comcom.2012.04.016"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/2381966.2381984"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/2309996.2310022"},{"key":"14","article-title":"For some eyes only: Protecting online information sharing","author":"ion","year":"2013","journal-title":"CODASPY"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1658939.1658959"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/CSE.2009.387"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1145\/359168.359176"},{"key":"3","article-title":"Fast dictionary attacks on passwords using time-space tradeoff","author":"narayanan","year":"2005","journal-title":"CCS"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1145\/1852658.1852660"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/2187836.2187878"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/PASSAT\/SocialCom.2011.26"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1572532.1572577"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/1592568.1592585"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/1397735.1397747"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1109\/WOWMOM.2009.5282446"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1592665.1592669"},{"key":"9","article-title":"Scramble! your social network data","author":"beato","year":"2011","journal-title":"PETS"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1145\/1966913.1966970","article-title":"Easier: Encryption-based access control in social networks with efficient revocation","author":"jahid","year":"2011","journal-title":"ASIACCS"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","start":{"date-parts":[[2014,6,10]]},"location":"Sydney, NSW","end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883904.pdf?arnumber=6883904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T12:38:51Z","timestamp":1565786331000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883904","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}