{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:41Z","timestamp":1750307201256,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078839","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Reciprocity attacks"],"prefix":"10.1145","author":[{"given":"Feng","family":"Zhu","sequence":"first","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]},{"given":"Sandra","family":"Carpenter","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]},{"given":"Ajinkya","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]},{"given":"Swapna","family":"Kolimi","sequence":"additional","affiliation":[{"name":"The University of Alabama in Huntsville, Huntsville, Alabama"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/988772.988777"},{"unstructured":"G. Newman and M. McNally \"Identity Theft Literature Review \" U. S. Department of Justice2005.  G. Newman and M. McNally \"Identity Theft Literature Review \" U. S. Department of Justice2005.","key":"e_1_3_2_1_2_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1509\/jppm.19.1.20.16944"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1142\/S0218488502001648"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1145\/501158.501163"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/336992.336995"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1409635.1409661"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 2009 International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2009","author":"Zhu F.","year":"2009","unstructured":"F. Zhu , , \" Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments ,\" in Proceedings of the 2009 International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2009 ), Toronto, CA , 2009 . F. Zhu, et al., \"Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments,\" in Proceedings of the 2009 International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous 2009), Toronto, CA, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson R.","year":"2008","unstructured":"R. Anderson , Security Engineering: A Guide to Building Dependable Distributed Systems , 2 nd Edition: Wiley , 2008 . R. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd Edition: Wiley, 2008.","edition":"2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1038\/scientificamerican0201-76"},{"key":"e_1_3_2_1_11_1","volume-title":"Rinehart & Winston","author":"Altman I.","year":"1973","unstructured":"I. Altman and D. A. Taylor , Social penetration: The development of interpersonal relationships: Holt , Rinehart & Winston , 1973 . I. Altman and D. A. Taylor, Social penetration: The development of interpersonal relationships: Holt, Rinehart & Winston, 1973."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1086\/209566"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1016\/j.obhdp.2008.02.012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1002\/(SICI)1520-6653(199924)13:1<5::AID-DIR2>3.0.CO;2-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1086\/250052"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.2307\/2092623"},{"key":"e_1_3_2_1_17_1","volume-title":"Computer Security: Addison Wesley","author":"Bishop M.","year":"2003","unstructured":"M. Bishop , Computer Security: Addison Wesley , 2003 . M. Bishop, Computer Security: Addison Wesley, 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"Trading Privacy for Trust,\" in Trust Managment","author":"Seigneur J.-M.","year":"2004","unstructured":"J.-M. Seigneur and C. D. Jensen , \" Trading Privacy for Trust,\" in Trust Managment . vol. 2995\/2004 , ed: Springer , 2004 . J.-M. Seigneur and C. D. Jensen, \"Trading Privacy for Trust,\" in Trust Managment. vol. 2995\/2004, ed: Springer, 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places,: CSLI Publications","author":"Reeves B.","year":"1998","unstructured":"B. Reeves and C. Nass , The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places,: CSLI Publications , 1998 . B. Reeves and C. Nass, The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places,: CSLI Publications, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/764008.763957"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1006\/game.1995.1027"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1145\/1620545.1620571"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1145\/1278201.1278202"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/PERCOM.2009.4912755"},{"key":"e_1_3_2_1_25_1","volume-title":"Computer Science","author":"Goldberg I.","year":"2000","unstructured":"I. Goldberg , \" A Pseudonymous Communications Infrastructure for the Internet ,\" Ph D thesis , Computer Science , University of California at Berkeley , 2000 . I. Goldberg, \"A Pseudonymous Communications Infrastructure for the Internet,\" PhD thesis, Computer Science, University of California at Berkeley, 2000."},{"key":"e_1_3_2_1_26_1","volume-title":"Some Conceptual Distinctions and Issues for Research,\" in Documenting Individual Identity: The Development of State Practices in the Modern World","author":"Marx G.","year":"2001","unstructured":"G. Marx , \" Identity and Anonymity : Some Conceptual Distinctions and Issues for Research,\" in Documenting Individual Identity: The Development of State Practices in the Modern World , J. Caplan and J. C. Torpey, Eds., ed, 2001 . G. Marx, \"Identity and Anonymity: Some Conceptual Distinctions and Issues for Research,\" in Documenting Individual Identity: The Development of State Practices in the Modern World, J. Caplan and J. C. Torpey, Eds., ed, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/MPRV.2003.1186725"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1066116.1189037"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1006\/ijhc.1999.0325"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1145\/365024.365304"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1109\/IAT.2004.88"},{"unstructured":"L. Sweeney \"Uniqueness of Simple Demographics in the U. S. Population \" Carnegie Mellon University Laboratory for International Data Privacy Pittsburgh2000.  L. Sweeney \"Uniqueness of Simple Demographics in the U. S. Population \" Carnegie Mellon University Laboratory for International Data Privacy Pittsburgh2000.","key":"e_1_3_2_1_33_1"}],"event":{"sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"acronym":"SOUPS '11","name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":33,"alternative-id":["10.1145\/2078827.2078839","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078839","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}