{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:07:34Z","timestamp":1729660054071,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/iccchina.2017.8330472","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:51:01Z","timestamp":1522975861000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["A privacy-preserving interactive messaging scheme based on users credibility over online social networks"],"prefix":"10.1109","author":[{"given":"Shunan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Ying","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Hongke","family":"Xia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/EUC.2011.73"},{"key":"ref11","first-page":"441","article-title":"Measuring user credibility in social media","author":"liu","year":"0","journal-title":"Social Computing Behavioral-Cultural Modeling and Prediction"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICCChina.2013.6671120"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ACCT.2014.89"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/SocialCom-PASSAT.2012.39"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1049\/iet-ifs.2014.0466"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/ICWS.2016.23"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/IACC.2016.115"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/PASSAT\/SocialCom.2011.147"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1870096.1870102"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/SCC.2015.38"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/ICACCI.2013.6637504"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/ARES.2015.80"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/INFOCOM.2016.7524578"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/CTS.2015.7210449"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1111\/j.1083-6101.2007.00393.x","article-title":"Social network sites: Definition, history, and scholarship","volume":"13","author":"ellison","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ARES.2013.67"}],"event":{"name":"2017 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2017,10,22]]},"location":"Qingdao","end":{"date-parts":[[2017,10,24]]}},"container-title":["2017 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326469\/8330314\/08330472.pdf?arnumber=8330472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T01:57:04Z","timestamp":1571018224000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2017.8330472","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}