{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:48:07Z","timestamp":1730224087120,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6133517","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T16:45:17Z","timestamp":1327941917000},"page":"1-5","source":"Crossref","is-referenced-by-count":11,"title":["Analysis of Privacy in Online Social Networks from the Graph Theory Perspective"],"prefix":"10.1109","author":[{"given":"L. A.","family":"Cutillo","sequence":"first","affiliation":[]},{"given":"R.","family":"Molva","sequence":"additional","affiliation":[]},{"given":"M.","family":"Onen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"A measurement of mixing time in social networks","author":"dell amico","year":"0","journal-title":"STM 2009 5th International Workshop on Security and Trust Management September 24-25 2009 Saint Malo France"},{"journal-title":"Performance and Privacy Tradeoff in Peer-to-Peer On-line Social Networks","year":"2010","author":"cutillo","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511813603"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7142-5_23"},{"journal-title":"Eclipse attacks on overlay networks Threats and defenses","year":"2006","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2009.4801860"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507722"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084416"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159945"},{"journal-title":"Towards a theory of scale-free graphs Definition properties and implications (extended version)","year":"2005","author":"li","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335325"},{"journal-title":"Online Social Networks Measurement Analysis and Applications to Distributed Information Systems","year":"2009","author":"mislove","key":"25"},{"key":"26","first-page":"297","article-title":"Re: Reliable email","author":"garriss","year":"0","journal-title":"Proc NSDI 2006"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1314389.1314402"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592669"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526784"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298311"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"4","first-page":"60","article-title":"The Small World Problem","volume":"2","author":"milgram","year":"1967","journal-title":"Psychology Today"},{"journal-title":"Satan Is on My Friends List Attacking Social Networks","year":"2008","author":"moyer","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","start":{"date-parts":[[2011,12,5]]},"location":"Houston, TX, USA","end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06133517.pdf?arnumber=6133517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T09:58:03Z","timestamp":1490090283000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/ieeexplore.ieee.org\/document\/6133517\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":27,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/glocom.2011.6133517","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}