{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:53:43Z","timestamp":1725450823407},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856671","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"80-85","source":"Crossref","is-referenced-by-count":2,"title":["An enhanced approach to preserving privacy in social network data publishing"],"prefix":"10.1109","author":[{"given":"Sihem","family":"Bensimessaoud","sequence":"first","affiliation":[]},{"given":"Nadjib","family":"Badache","sequence":"additional","affiliation":[]},{"given":"Souad","family":"Benmeziane","sequence":"additional","affiliation":[]},{"given":"Amina","family":"Djellalbia","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref6","first-page":"7","article-title":"Anonymizing social networks","author":"hay","year":"2007","journal-title":"University of Massachusetts Amherst Tech Rep"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376629"},{"key":"ref8","article-title":"Dijkstra's algorithm","author":"yan","year":"2014","journal-title":"Massachusetts Inst Technol"},{"year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.69"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497459"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856671.pdf?arnumber=7856671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T22:34:05Z","timestamp":1488407645000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856671\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856671","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}