{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:37:13Z","timestamp":1730248633852,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750212","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"306-312","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced Virtual Private Social Networks: Implementing user content confidentiality"],"prefix":"10.1109","author":[{"given":"Charles","family":"Clarke","sequence":"first","affiliation":[]},{"given":"Eckhard","family":"Pfluegel","sequence":"additional","affiliation":[]},{"given":"Dimitris","family":"Tsaptsinos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.26"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435351"},{"journal-title":"Secretwit-twitter Client That Hides Messages in Tweets","year":"2011","author":"zirikovic","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/DCABES.2013.45"},{"key":"1","article-title":"Decentralization the future of online social networking","volume":"2","author":"yeung","year":"2009","journal-title":"Position paper for the W3C Workshop on the Future of Social Networking"},{"year":"0","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-4730-9_5"},{"journal-title":"Virtual Private Social Networks and A Facebook Implementation","year":"2008","author":"conti","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943521"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774219"},{"year":"2012","author":"griffiths","key":"9"},{"journal-title":"Portable Python 3 2 5 1-download Page","year":"2013","author":"python","key":"8"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750212.pdf?arnumber=6750212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:06:04Z","timestamp":1490306764000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750212\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750212","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}