{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T22:21:08Z","timestamp":1772058068802,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1456403.1456405","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":117,"title":["FlyByNight"],"prefix":"10.1145","author":[{"given":"Matthew M.","family":"Lucas","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_3_2_1_2_1","first-page":"127","volume-title":"Divertible Protocols and Atomic Proxy Cryptography. Lecture notes in computer science","author":"Blaze M., G.","unstructured":"Blaze , M., G. Bleumer , and M. Strauss . Divertible Protocols and Atomic Proxy Cryptography. Lecture notes in computer science , pages 127 -- 144 . Blaze, M., G. Bleumer, and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. Lecture notes in computer science, pages 127--144."},{"key":"e_1_3_2_1_3_1","volume-title":"Privacy Protection for Social Networking APIs","author":"Felt Adrienne","year":"2008","unstructured":"Felt , Adrienne , and Evans , David . Privacy Protection for Social Networking APIs . University of Virginia , 2008 . Felt, Adrienne, and Evans, David. Privacy Protection for Social Networking APIs. University of Virginia, 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1179601.1179619"},{"key":"e_1_3_2_1_5_1","volume-title":"http:\/\/www.greasespot.net","author":"Greasemonkey","year":"2008","unstructured":"Greasemonkey . http:\/\/www.greasespot.net , 2008 . Greasemonkey. http:\/\/www.greasespot.net, 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/www.hanewin.net\/encrypt\/","author":"Hanewinkel Herbert","year":"2005","unstructured":"Hanewinkel , Herbert . PGP \/ GnuPG \/ OpenPGP message Encryption in JavaScript . http:\/\/www.hanewin.net\/encrypt\/ , 2005 . Hanewinkel, Herbert. PGP \/ GnuPG \/ OpenPGP message Encryption in JavaScript. http:\/\/www.hanewin.net\/encrypt\/, 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and MySpace.com","author":"Hodge Matthew J","unstructured":"Hodge , Matthew J . The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and MySpace.com . Southern Illinois University Law Journal . Hodge, Matthew J. The Fourth Amendment and Privacy Issues on the \"New\" Internet: Facebook.com and MySpace.com. Southern Illinois University Law Journal."},{"key":"e_1_3_2_1_9_1","unstructured":"\"Hushmail -- Free Email with Privacy.\" Hush Communications Corp 2008. http:\/\/www.hushmail.com.  \"Hushmail -- Free Email with Privacy.\" Hush Communications Corp 2008. http:\/\/www.hushmail.com."},{"key":"e_1_3_2_1_10_1","volume-title":"A. and Y. Dodis. Proxy Cryptography Revisited. Proceedings of the Network and Distributed System Security Symposium (NDSS)","author":"Ivan","year":"2003","unstructured":"Ivan , A. and Y. Dodis. Proxy Cryptography Revisited. Proceedings of the Network and Distributed System Security Symposium (NDSS) , February , 2003 . Ivan, A. and Y. Dodis. Proxy Cryptography Revisited. Proceedings of the Network and Distributed System Security Symposium (NDSS), February, 2003."},{"key":"e_1_3_2_1_11_1","first-page":"347","volume":"389","year":"1967","unstructured":"Katz v. United States , 389 U.S. 347 ( 1967 ). Katz v. United States, 389 U.S. 347 (1967).","journal-title":"United States"},{"key":"e_1_3_2_1_12_1","unstructured":"Kerr Orin S. \"A User's Guide to the Stored Communications Act and a Legislator's Guide to Amending it.\" George Washington University Law Review 2004: 1208--1227.  Kerr Orin S. \"A User's Guide to the Stored Communications Act and a Legislator's Guide to Amending it.\" George Washington University Law Review 2004: 1208--1227."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066677.1066752"},{"key":"e_1_3_2_1_14_1","unstructured":"Laurie Ben. Apres: A System for Anonymous Presence. http:\/\/www.apache-ssl.org\/apres.pdf 2004.  Laurie Ben. Apres: A System for Anonymous Presence. http:\/\/www.apache-ssl.org\/apres.pdf 2004."},{"key":"e_1_3_2_1_15_1","volume-title":"Hong Kong","author":"Perrig Adrian","year":"1999","unstructured":"Perrig , Adrian and Dawn Song . \" Hash Visualization : a New Technique to Improve Real-World Security.\" In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC) , Hong Kong , July 1999 . Perrig, Adrian and Dawn Song. \"Hash Visualization: a New Technique to Improve Real-World Security.\" In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC), Hong Kong, July 1999."},{"key":"e_1_3_2_1_16_1","volume-title":"CA","author":"Reis Charles","year":"2008","unstructured":"Reis , Charles , Steven D . Gribble , Tadayoshi Kohno , and Nicholas C. Weaver . \"Detecting In-Flight Page Changes with Web Tripwires.\" Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08), San Francisco , CA , April 2008 . Reis, Charles, Steven D. Gribble, Tadayoshi Kohno, and Nicholas C. Weaver. \"Detecting In-Flight Page Changes with Web Tripwires.\" Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI '08), San Francisco, CA, April 2008."},{"key":"e_1_3_2_1_17_1","unstructured":"Signel Ryan. \"Encrypted E-mail Company Hushmail Spills to Feds.\" http:\/\/blog.wired.com\/27bstroke6\/2007\/11\/encrypted-e-mai.html 2007.  Signel Ryan. \"Encrypted E-mail Company Hushmail Spills to Feds.\" http:\/\/blog.wired.com\/27bstroke6\/2007\/11\/encrypted-e-mai.html 2007."},{"key":"e_1_3_2_1_18_1","volume-title":"October 10","author":"Scoop","year":"2007","unstructured":"\" Scoop : Facebook Employees know what profiles you look at.\" Valleywag , October 10 , 2007 . http:\/\/valleywag.com\/tech\/scoop\/facebook-employees-know-what-profiles-you-look-at-315901.php. \"Scoop: Facebook Employees know what profiles you look at.\" Valleywag, October 10, 2007. http:\/\/valleywag.com\/tech\/scoop\/facebook-employees-know-what-profiles-you-look-at-315901.php."},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/www.facebook.com\/press\/info.php?statistics","author":"\"Statistics | Facebook.\" Facebook Inc.","year":"2008","unstructured":"\"Statistics | Facebook.\" Facebook Inc. http:\/\/www.facebook.com\/press\/info.php?statistics , 2008 . \"Statistics | Facebook.\" Facebook Inc. http:\/\/www.facebook.com\/press\/info.php?statistics, 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"Walker John. Javascrypt: Browser-based Cryptography Tools. http:\/\/www.fourmilab.ch\/javascrypt\/ 2005.  Walker John. Javascrypt: Browser-based Cryptography Tools. http:\/\/www.fourmilab.ch\/javascrypt\/ 2005."},{"key":"e_1_3_2_1_21_1","unstructured":"\"You've Been Poked by University Police.\" Daily Illini July 25 2006. http:\/\/media.www.dailyillini.com\/media\/storage\/paper736\/news\/2006\/07\/25\/Opinions\/Editorial.Youve.Been.Poked.By.University.Police-2133945.shtml  \"You've Been Poked by University Police.\" Daily Illini July 25 2006. http:\/\/media.www.dailyillini.com\/media\/storage\/paper736\/news\/2006\/07\/25\/Opinions\/Editorial.Youve.Been.Poked.By.University.Police-2133945.shtml"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","location":"Alexandria Virginia USA","acronym":"CCS08","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 7th ACM workshop on Privacy in the electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456403.1456405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456403.1456405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456403.1456405"}},"subtitle":["mitigating the privacy risks of social networking"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":21,"alternative-id":["10.1145\/1456403.1456405","10.1145\/1456403"],"URL":"https:\/\/doi.org\/10.1145\/1456403.1456405","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}