{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:58:44Z","timestamp":1725749924197},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410321"},{"type":"electronic","value":"9783642410338"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41033-8_90","type":"book-chapter","created":{"date-parts":[[2013,9,24]],"date-time":"2013-09-24T22:14:30Z","timestamp":1380060870000},"page":"709-713","source":"Crossref","is-referenced-by-count":1,"title":["AnonyFacebook - Liking Facebook Posts Anonymously"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Alves","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Ferreira","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"90_CR1","doi-asserted-by":"crossref","unstructured":"Al-Ani, B., Mark, G., Chung, J., Jones, J.: The Egyptian blogosphere: a counter-narrative of the revolution. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work (2012)","DOI":"10.1145\/2145204.2145213"},{"issue":"5","key":"90_CR2","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1002\/ett.4460080506","volume":"8","author":"R. Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. European Transactions on Telecommunications\u00a08(5), 481\u2013490 (1997)","journal-title":"European Transactions on Telecommunications"},{"key":"90_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1007\/0-387-34805-0_28","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"Y.G. Desmedt","year":"1990","unstructured":"Desmedt, Y.G., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 307\u2013315. Springer, Heidelberg (1990)"},{"key":"90_CR4","first-page":"1375","volume":"5","author":"G. Lotan","year":"2011","unstructured":"Lotan, G., Graeff, E., Ananny, M., Gaffney, D., Pearce, I., Boyd, D.: The Revolutions Were Tweeted: Information Flows During the 2011 Tunisian and Egyptian Revolutions. International Journal of Communication\u00a05, 1375\u20131406 (2011)","journal-title":"International Journal of Communication"},{"key":"90_CR5","unstructured":"Rivest, R.: On data banks and privacy homomorphisms. Foundations of Secure Computation\u00a04(11) (1978)"},{"key":"90_CR6","doi-asserted-by":"crossref","unstructured":"Wulf, V., Misaki, K., Atam, M.: On the ground\u2019in Sidi Bouzid: investigating social media use during the tunisian revolution. In: Proceedings of the 2013 ACM Conference on Computer Supported Cooperative Work, pp. 1409\u20131418 (2013)","DOI":"10.1145\/2441776.2441935"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2013 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41033-8_90","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T10:39:56Z","timestamp":1558089596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41033-8_90"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410321","9783642410338"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41033-8_90","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}