{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T14:28:17Z","timestamp":1777991297433,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T00:00:00Z","timestamp":1355097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,12,10]]},"DOI":"10.1145\/2413176.2413215","type":"proceedings-article","created":{"date-parts":[[2012,12,17]],"date-time":"2012-12-17T15:12:21Z","timestamp":1355757141000},"page":"337-348","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Cachet"],"prefix":"10.1145","author":[{"given":"Shirin","family":"Nilizadeh","sequence":"first","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Sonia","family":"Jahid","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]},{"given":"Prateek","family":"Mittal","sequence":"additional","affiliation":[{"name":"University of California, Berkeley, Oakland, CA, USA"}]},{"given":"Nikita","family":"Borisov","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana-Champaign, IL, USA"}]},{"given":"Apu","family":"Kapadia","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,12,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2009.30"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04190-7_16"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.12.006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2008.40"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2005.5"},{"key":"e_1_3_2_1_6_1","volume-title":"NDSS","author":"Backes M.","year":"2011","unstructured":"M. Backes , M. Maffei , and K. Pecina . A security API for distributed social networks . In NDSS , 2011 . M. Backes, M. Maffei, and K. Pecina. A security API for distributed social networks. In NDSS, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592585"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032162.2032174"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2010.33"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2023718.2023732"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833726"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989658"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060317"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_17_1","volume-title":"Hummingbird: Privacy at the time of Twitter. IACR Cryptology ePrint Archive","author":"Cristofaro E. D.","year":"2011","unstructured":"E. D. Cristofaro , C. Soriente , G. Tsudik , and A. Williams . Hummingbird: Privacy at the time of Twitter. IACR Cryptology ePrint Archive , 2011 :640, 2011. E. D. Cristofaro, C. Soriente, G. Tsudik, and A. Williams. Hummingbird: Privacy at the time of Twitter. IACR Cryptology ePrint Archive, 2011:640, 2011."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2009.5282446"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1654988.1654991"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1946143.1946163"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2025968.2025980"},{"key":"e_1_3_2_1_22_1","unstructured":"Diaspora*. https:\/\/joindiaspora.com\/.  Diaspora*. https:\/\/joindiaspora.com\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687813"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064218"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 21st USENIX conference on Security symposium, Security'12","author":"Feldman A. J.","year":"2012","unstructured":"A. J. Feldman , A. Blankstein , M. J. Freedman , and E. W. Felten . Social networking with {F}rientegrity: privacy and integrity with an untrusted provider . In Proceedings of the 21st USENIX conference on Security symposium, Security'12 , Berkeley, CA, USA , 2012 . USENIX Association. A. J. Feldman, A. Blankstein, M. J. Freedman, and E. W. Felten. Social networking with {F}rientegrity: privacy and integrity with an untrusted provider. In Proceedings of the 21st USENIX conference on Security symposium, Security'12, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_28_1","first-page":"59","volume-title":"In Proc. 3rd IEEE Conf. on Wireless On demand Network Syst. and Services (WONS '06)","author":"Gavidia D.","year":"2006","unstructured":"D. Gavidia . A gossip-based distributed news service for wireless mesh networks . In In Proc. 3rd IEEE Conf. on Wireless On demand Network Syst. and Services (WONS '06) , pages 59 -- 67 . IEEE Computer Society , 2006 . D. Gavidia. A gossip-based distributed news service for wireless mesh networks. In In Proc. 3rd IEEE Conf. on Wireless On demand Network Syst. and Services (WONS '06), pages 59--67. IEEE Computer Society, 2006."},{"key":"e_1_3_2_1_29_1","volume-title":"Procedings of the 4th IEEE Conference on Wireless On demand Network Systems and Services (WONS)","author":"Gavidia D.","year":"2007","unstructured":"D. Gavidia , G. P. Jesi , C. Gamage , and M. van Steen . Canning spam in gossip wireless networks . In Procedings of the 4th IEEE Conference on Wireless On demand Network Systems and Services (WONS) , Jan. 2007 . D. Gavidia, G. P. Jesi, C. Gamage, and M. van Steen. Canning spam in gossip wireless networks. In Procedings of the 4th IEEE Conference on Wireless On demand Network Systems and Services (WONS), Jan. 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397747"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966970"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197504"},{"key":"e_1_3_2_1_33_1","volume-title":"NDSS","author":"Kapadia A.","year":"2008","unstructured":"A. Kapadia and N. Triandopoulos . Halo: High-Assurance Locate for Distributed Hash Tables . In NDSS , 2008 . A. Kapadia and N. Triandopoulos. Halo: High-Assurance Locate for Distributed Hash Tables. In NDSS, 2008."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/946243.946317"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1317379.1317381"},{"key":"e_1_3_2_1_36_1","volume-title":"Telecommunication Systems","author":"Klein B.","year":"2011","unstructured":"B. Klein and H. Hlavacs . A socially aware caching mechanism for encounter networks . Telecommunication Systems , 2011 . B. Klein and H. Hlavacs. A socially aware caching mechanism for encounter networks. Telecommunication Systems, 2011."},{"key":"e_1_3_2_1_37_1","volume-title":"NSDI","author":"Lesniewski-Laas C.","year":"2010","unstructured":"C. Lesniewski-Laas and M. F. Kaashoek . Whanau: a Sybil-proof distributed hash table . In NSDI , 2010 . C. Lesniewski-Laas and M. F. Kaashoek. Whanau: a Sybil-proof distributed hash table. In NSDI, 2010."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068823"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456403.1456405"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2010.5470664"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/646334.687801"},{"key":"e_1_3_2_1_42_1","first-page":"338","volume-title":"Peer-to-Peer Computing","author":"Mega G.","year":"2011","unstructured":"G. Mega , A. Montresor , and G. P. Picco . Efficient dissemination in decentralized social networks . In Peer-to-Peer Computing , pages 338 -- 347 , 2011 . G. Mega, A. Montresor, and G. P. Picco. Efficient dissemination in decentralized social networks. In Peer-to-Peer Computing, pages 338--347, 2011."},{"key":"e_1_3_2_1_43_1","volume-title":"NDSS","author":"Mittal P.","year":"2012","unstructured":"P. Mittal , M. Caesar , and N. Borisov . X-Vine: Secure and pseudonymous routing using social networks . In NDSS , 2012 . P. Mittal, M. Caesar, and N. Borisov. X-Vine: Secure and pseudonymous routing using social networks. In NDSS, 2012."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140283"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2010.5569996"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180409"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046556.2046562"},{"key":"e_1_3_2_1_48_1","unstructured":"K. Opsahl. Facebook's eroding privacy policy: A timeline. https:\/\/www.eff.org\/deeplinks\/2010\/04\/facebook-timeline.  K. Opsahl. Facebook's eroding privacy policy: A timeline. https:\/\/www.eff.org\/deeplinks\/2010\/04\/facebook-timeline."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.71"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:2"},{"key":"e_1_3_2_1_51_1","volume-title":"Middleware","author":"Rowstron A.","year":"2001","unstructured":"A. Rowstron and P. Druschel . Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems . In Middleware , 2001 . A. Rowstron and P. Druschel. Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems. In Middleware, 2001."},{"key":"e_1_3_2_1_52_1","unstructured":"Skype. http:\/\/www.skype.com\/.  Skype. http:\/\/www.skype.com\/."},{"key":"e_1_3_2_1_53_1","article-title":"Facebook, MySpace confront privacy loophole","author":"Steel E.","year":"2010","unstructured":"E. Steel and J. E. Vascellaro . Facebook, MySpace confront privacy loophole . The Wall Street Journal , May 2010 . E. Steel and J. E. Vascellaro. Facebook, MySpace confront privacy loophole. The Wall Street Journal, May 2010.","journal-title":"The Wall Street Journal"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851226"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/977400.977981"},{"key":"e_1_3_2_1_57_1","first-page":"1053","volume-title":"Computers and Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE International Symposium on","author":"Xu Z.","year":"2003","unstructured":"Z. Xu and Y. Hu . SBARC: A supernode based peer-to-peer file sharing system . In Computers and Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE International Symposium on , pages 1053 -- 1058 . IEEE, 2003 . Z. Xu and Y. Hu. SBARC: A supernode based peer-to-peer file sharing system. In Computers and Communication, 2003.(ISCC 2003). Proceedings. Eighth IEEE International Symposium on, pages 1053--1058. IEEE, 2003."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195698"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.48"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2007.370285"}],"event":{"name":"CoNEXT '12: Conference on emerging Networking Experiments and Technologies","location":"Nice France","acronym":"CoNEXT '12","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 8th international conference on Emerging networking experiments and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413215","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2413176.2413215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:28Z","timestamp":1750234708000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2413176.2413215"}},"subtitle":["a decentralized architecture for privacy preserving social networking with caching"],"short-title":[],"issued":{"date-parts":[[2012,12,10]]},"references-count":60,"alternative-id":["10.1145\/2413176.2413215","10.1145\/2413176"],"URL":"https:\/\/doi.org\/10.1145\/2413176.2413215","relation":{},"subject":[],"published":{"date-parts":[[2012,12,10]]},"assertion":[{"value":"2012-12-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}