{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:55:07Z","timestamp":1725616507517},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,5,8]]},"DOI":"10.1145\/2484313.2484334","type":"proceedings-article","created":{"date-parts":[[2013,5,14]],"date-time":"2013-05-14T12:15:27Z","timestamp":1368533727000},"page":"167-172","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamix"],"prefix":"10.1145","author":[{"given":"Abedelaziz","family":"Mohaisen","sequence":"first","affiliation":[{"name":"Verisign Labs, Reston, VA, USA"}]},{"given":"Yongdae","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755743.1755761"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0619-4","volume-title":"Modern graph theory","author":"Bollob\u00e1s B.","year":"1998","unstructured":"B. Bollob\u00e1s . Modern graph theory , volume 184 . Springer , 1998 . B. Bollob\u00e1s. Modern graph theory, volume 184. Springer, 1998."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288113"},{"key":"e_1_3_2_1_4_1","volume-title":"PETS","author":"Danezis G.","year":"2010","unstructured":"G. Danezis , C. D\u0131az , C. Troncoso , and B. Laurie . Drac: An architecture for anonymous low-volume communications . In PETS , 2010 . G. Danezis, C. D\u0131az, C. Troncoso, and B. Laurie. Drac: An architecture for anonymous low-volume communications. In PETS, 2010."},{"key":"e_1_3_2_1_5_1","author":"Gjoka M.","year":"2011","unstructured":"M. Gjoka , C. T. Butts , M. Kurant , and A. Markopoulou . Multigraph sampling of online social networks. IEEE JSAC , 2011 . M. Gjoka, C. T. Butts, M. Kurant, and A. Markopoulou. Multigraph sampling of online social networks. IEEE JSAC, 2011.","journal-title":"Multigraph sampling of online social networks. IEEE JSAC"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.246"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6515-8_13"},{"key":"e_1_3_2_1_8_1","volume-title":"SPIR","author":"Ley M.","year":"2009","unstructured":"M. Ley . The DBLP computer science bibliography: Evolution, research issues, perspectives . In SPIR , 2009 . M. Ley. The DBLP computer science bibliography: Evolution, research issues, perspectives. In SPIR, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"NDSS","author":"Mittal P.","year":"2013","unstructured":"P. Mittal , M. Wright , and N. Borisov . Pisces: Anonymous communication using social networks . In NDSS , 2013 . P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. In NDSS, 2013."},{"key":"e_1_3_2_1_10_1","volume-title":"INFOCOM","author":"Mohaisen A.","year":"2011","unstructured":"A. Mohaisen , N. Hopper , and Y. Kim . Incorporating trust into social network-based sybil defenses . In INFOCOM , 2011 . A. Mohaisen, N. Hopper, and Y. Kim. Incorporating trust into social network-based sybil defenses. In INFOCOM, 2011."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2011.48"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414476"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879191"},{"key":"e_1_3_2_1_14_1","volume-title":"PETS","author":"Nagaraja S.","year":"2007","unstructured":"S. Nagaraja . Anonymity in the wild . In PETS , 2007 . S. Nagaraja. Anonymity in the wild. In PETS, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401972"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281269"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401973"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592675"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159945"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398795"}],"event":{"name":"ASIA CCS '13: 8th ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Hangzhou China","acronym":"ASIA CCS '13"},"container-title":["Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2484313.2484334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T05:37:54Z","timestamp":1673242674000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2484313.2484334"}},"subtitle":["anonymity on dynamic social structures"],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":20,"alternative-id":["10.1145\/2484313.2484334","10.1145\/2484313"],"URL":"https:\/\/doi.org\/10.1145\/2484313.2484334","relation":{},"subject":[],"published":{"date-parts":[[2013,5,8]]},"assertion":[{"value":"2013-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}