{ "labelLang" : "hun", "responseDate" : "2024-03-28 13:38", "content" : { "otype" : "BookChapter", "mtid" : 22832297, "status" : "APPROVED", "error" : "INCOMPLETE", "published" : true, "unhandledTickets" : 0, "oldTimestamp" : "2018-09-14T08:19:42.000+0000", "deleted" : false, "oldId" : 12832297, "lastRefresh" : "2023-03-27T11:40:13.584+0000", "lastModified" : "2023-03-27T11:38:50.150+0000", "created" : "2013-01-15T15:52:09.000+0000", "creator" : { "otype" : "Admin", "mtid" : 10015168, "link" : "/api/admin/10015168", "label" : "Szakonyi Erzsebet (RAMKI admin 4)", "familyName" : "Szakonyi", "givenName" : "Erzsebet", "published" : true, "oldId" : 10015168, "snippet" : true }, "lastDuplumSearch" : "2023-08-24T12:45:07.198+0000", "core" : false, "citation" : true, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000312, "link" : "/api/subtype/10000312", "label" : "Konferenciaközlemény (Könyvrészlet)", "name" : "Konferenciaközlemény", "nameEng" : "Conference paper", "docType" : { "otype" : "PublicationType", "mtid" : 25, "link" : "/api/publicationtype/25", "label" : "Könyvrészlet", "code" : 25, "otypeName" : "BookChapter", "listPosition" : 2, "published" : true, "oldId" : 25, "snippet" : true }, "listPosition" : 228, "published" : true, "oldId" : 10000312, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "firstAuthor" : "Asuncion, AU", "authorships" : [ { "otype" : "PersonAuthorship", "mtid" : 21592961, "link" : "/api/authorship/21592961", "label" : "Asuncion, AU", "listPosition" : 1, "share" : 0.0, "first" : true, "last" : false, "familyName" : "Asuncion", "givenName" : "AU", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049070, "snippet" : true }, { "otype" : "PersonAuthorship", "mtid" : 21592962, "link" : "/api/authorship/21592962", "label" : "Goodrich, MT", "listPosition" : 2, "share" : 0.0, "first" : false, "last" : true, "familyName" : "Goodrich", "givenName" : "MT", "authorTyped" : true, "editorTyped" : false, "otherTyped" : false, "type" : { "otype" : "AuthorshipType", "mtid" : 1, "link" : "/api/authorshiptype/1", "label" : "Szerző", "code" : 0, "published" : true, "oldId" : 0, "snippet" : true }, "published" : false, "oldId" : 31049069, "snippet" : true } ], "title" : "Turning privacy leaks into floods: Surreptitious discovery of social network friendships and other sensitive binary attribute vectors Turning privacy leaks into floods: Surreptitious discovery of social network friendships and other sensitive binary attribute vectors", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 5700981, "link" : "/api/publicationidentifier/5700981", "label" : "DOI: 10.1145/1866919.1866923", "source" : { "otype" : "PlainSource", "mtid" : 6, "link" : "/api/publicationsource/6", "label" : "DOI", "type" : { "otype" : "PublicationSourceType", "mtid" : 10001, "link" : "/api/publicationsourcetype/10001", "label" : "DOI", "mayHaveOa" : true, "published" : true, "snippet" : true }, "name" : "DOI", "nameEng" : "DOI", "linkPattern" : "https://doi.org/@@@", "publiclyVisible" : true, "published" : true, "oldId" : 6, "snippet" : true }, "validState" : "NO", "idValue" : "10.1145/1866919.1866923", "realUrl" : "https://doi.org/10.1145/1866919.1866923", "published" : false, "oldId" : 2844179, "snippet" : true }, { "otype" : "PublicationIdentifier", "mtid" : 5700980, "link" : "/api/publicationidentifier/5700980", "label" : "Scopus: 78650185923", "source" : { "otype" : "PlainSource", "mtid" : 3, "link" : "/api/publicationsource/3", "label" : "Scopus", "type" : { "otype" : "PublicationSourceType", "mtid" : 10003, "link" : "/api/publicationsourcetype/10003", "label" : "Indexelő adatbázis", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "Scopus", "linkPattern" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-@@@", "publiclyVisible" : true, "published" : true, "oldId" : 3, "snippet" : true }, "validState" : "NO", "idValue" : "78650185923", "realUrl" : "http://www.scopus.com/record/display.url?origin=inward&eid=2-s2.0-78650185923", "published" : false, "oldId" : 2844180, "snippet" : true } ], "firstPage" : "21", "lastPage" : "30", "firstPageOrInternalIdForSort" : "21", "pageLength" : 10, "publishedYear" : 2010, "digital" : null, "printed" : null, "sourceYear" : 2013, "packet" : "(Szakonyi Erzsebet (MATK admin); 2013.01.15. 16:50:48)", "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : true, "conferencePublication" : true, "nationalOrigin" : null, "missingAuthor" : false, "oaType" : "NONE", "oaCheckDate" : "2023-03-27", "oaFree" : false, "citationCount" : 0, "citationCountUnpublished" : 0, "citationCountWoOther" : 0, "independentCitCountWoOther" : 0, "doiCitationCount" : 0, "wosCitationCount" : 0, "scopusCitationCount" : 0, "independentCitationCount" : 0, "unhandledCitationCount" : 0, "citingPubCount" : 0, "independentCitingPubCount" : 0, "unhandledCitingPubCount" : 0, "citedPubCount" : 1, "citedCount" : 1, "references" : [ { "otype" : "Reference", "mtid" : 15676886, "link" : "/api/reference/15676886", "label" : "1. Amirbekyan, A., Estivill-Castro, V., A new efficient privacy-preserving scalar product protocol (2007) AusDM", "listPosition" : 1, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676887, "link" : "/api/reference/15676887", "label" : "2. Atallah, M.J., Kerschbaum, F., Du, W., Secure and private sequence comparisons (2003) WPES, , ACM", "listPosition" : 2, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676888, "link" : "/api/reference/15676888", "label" : "3. Atallah, M.J., Li, J., Secure outsourcing of sequence comparisons (2005) Int. J. Inf. Secur., 4 (4), pp. 277-287", "listPosition" : 3, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676889, "link" : "/api/reference/15676889", "label" : "4. Backstrom, L., Dwork, C., Kleinberg, J., Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography (2007) WWW, , ACM", "listPosition" : 4, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676890, "link" : "/api/reference/15676890", "label" : "5. Bancilhon, F., Spyratos, N., Protection of information in relational data bases (1977) VLDB, pp. 494-500", "listPosition" : 5, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676891, "link" : "/api/reference/15676891", "label" : "6. Behar, D.M., Rosset, S., Blue-Smith, J., Balanovsky, O., Tzur, S., Comas, D., Mitchell, R.J., Wells, R.S., The genographic project public participation mitochondrial DNA database (2005) PLoS Genetics, 3 (6). , 1, 1", "listPosition" : 6, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676892, "link" : "/api/reference/15676892", "label" : "7. Brandon, M., Lott, M., Nguyen, K., Spolim, S., Navathe, S., Baldi, P., Wallace, D., MITOMAP: A human mitochondrial genome database - 2004 update (2005) Nucleic Acids Research, 33", "listPosition" : 7, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676893, "link" : "/api/reference/15676893", "label" : "8. Deutsch, A., Papakonstantinou, Y., Privacy in database publishing (2005) LNCS, 3363, pp. 230-245. , T. Eiter and L. Libkin, editors, ICDT, Springer", "listPosition" : 8, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676894, "link" : "/api/reference/15676894", "label" : "9. Dorfman, R., The detection of defective members of large populations (1943) Ann. Math. Statist., 14, pp. 436-440", "listPosition" : 9, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676895, "link" : "/api/reference/15676895", "label" : "10. Du, D.-Z., Hwang, F.K., (2000) Combinatorial Group Testing and Its Applications, 2nd ed., , World Scientific", "listPosition" : 10, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676896, "link" : "/api/reference/15676896", "label" : "11. Du, W., Atallah, M.J., Protocols for secure remote database access with approximate matching (2001) E-Commerce Security and Privacy: Adv. in Info Security, 2, pp. 87-112", "listPosition" : 11, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676897, "link" : "/api/reference/15676897", "label" : "12. Du, W., Atallah, M.J., Secure multi-party computation problems and their applications: A review and open problems (2001) NSPW", "listPosition" : 12, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676898, "link" : "/api/reference/15676898", "label" : "13. DuBois, C.L., (2008) UCI Network Data Repository", "listPosition" : 13, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676899, "link" : "/api/reference/15676899", "label" : "14. Dwork, C., McSherry, F., Talwar, K., The price of privacy and the limits of LP decoding (2007) STOC, pp. 85-94. , ACM", "listPosition" : 14, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676900, "link" : "/api/reference/15676900", "label" : "15. Eppstein, D., Goodrich, M.T., Hirschberg, D.S., Improved combinatorial group testing for real-world problem sizes (2005) Lecture Notes Comput. Sci., , WADS, Springer", "listPosition" : 15, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676901, "link" : "/api/reference/15676901", "label" : "16. Freedman, M., Nissim, K., Pinkas, B., Efficient private matching and set intersection (2004) Adv. in Cryptology - EUROCRYPT", "listPosition" : 16, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676902, "link" : "/api/reference/15676902", "label" : "17. Gjoka, M., Kurant, M., Butts, C.T., Markopoulou, A., A walk in facebook: Uniform sampling of users in online social networks (2009) CoRR, , abs/0906.0060", "listPosition" : 17, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676903, "link" : "/api/reference/15676903", "label" : "18. Goldreich, O., Micali, S., Wigderson, A., How to play any mental game (1987) STOC, pp. 218-229. , ACM", "listPosition" : 18, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676904, "link" : "/api/reference/15676904", "label" : "19. Goodrich, M.T., The mastermind attack on genomic data (2009) IEEE Symposium on Security and Privacy, , IEEE Press", "listPosition" : 19, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676905, "link" : "/api/reference/15676905", "label" : "20. Gross, R., Acquisti, A., Heinz III, H.J., Information revelation and privacy in online social networks (2005) WPES, , ACM", "listPosition" : 20, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676906, "link" : "/api/reference/15676906", "label" : "21. Harihara, S., Hirai, M., Suutou, Y., Shimizu, K., Omoto, K., Frequency of a 9-bp deletion in the mitochondrial DNA among Asian populations (1992) Human Biology, 64 (2), pp. 161-166", "listPosition" : 21, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676907, "link" : "/api/reference/15676907", "label" : "22. Jernigan, C., Mistree, B., Gaydar: Facebook friendships expose sexual orientation (2009) First Monday [Online], 14 (10)", "listPosition" : 22, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676908, "link" : "/api/reference/15676908", "label" : "23. Jha, S., Kruger, L., Shmatikov, V., Towards practical privacy for genomic computation (2008) IEEE Symp. on Security and Privacy, pp. 216-230", "listPosition" : 23, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676909, "link" : "/api/reference/15676909", "label" : "24. Jiang, W., Murugesan, M., Clifton, C., Si, L., Similar document detection with limited information disclosure (2008) ICDE, pp. 735-743. , IEEE", "listPosition" : 24, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676910, "link" : "/api/reference/15676910", "label" : "25. Kantarcioǧlu, M., Jin, J., Clifton, C., When do data mining results violate privacy? (2004) KDD, pp. 599-604. , ACM", "listPosition" : 25, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676911, "link" : "/api/reference/15676911", "label" : "26. Knuth, D., (1973) The Art of Computer Programming, , Addison-Wesley", "listPosition" : 26, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676912, "link" : "/api/reference/15676912", "label" : "27. Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., Christakis, N., Tastes, ties, and time: A new social network dataset using Facebook.com (2008) Social Networks, 30 (4), pp. 330-342", "listPosition" : 27, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676913, "link" : "/api/reference/15676913", "label" : "28. Miklau, G., Suciu, D., A formal analysis of information disclosure in data exchange (2007) Journal of Computer and System Sciences, 73 (3), pp. 507-534. , PII S0022000006001127, Database Theory 2004, DOI: 10.1016/j.jcss.2006.10.004,", "listPosition" : 28, "doi" : "10.1016/j.jcss.2006.10.004,", "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676914, "link" : "/api/reference/15676914", "label" : "29. Narayanan, A., Shmatikov, V., Robust de-anonymization of large sparse datasets (2008) IEEE SP, pp. 111-125", "listPosition" : 29, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676915, "link" : "/api/reference/15676915", "label" : "30. Narayanan, A., Shmatikov, V., De-anonymizing social networks (2009) IEEE SP, pp. 173-187", "listPosition" : 30, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676916, "link" : "/api/reference/15676916", "label" : "31. Pakendorf, B., Stoneking, M., Mitochondrial DNA and human evolution (2005) Annual Rev. Genomics Hum. Genet., 6, pp. 165-183", "listPosition" : 31, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676917, "link" : "/api/reference/15676917", "label" : "32. Ruiz-Pesini, E., Lott, M.T., Procaccio, V., Poole, J., Brandon, M.C., Mishmar, D., Yi, C., Wallace, D.C., An enhanced MITOMAP with a global mtDNA mutational philogeny (2007) Nucleic Acids Research, 35, pp. D823-D828", "listPosition" : 32, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676918, "link" : "/api/reference/15676918", "label" : "33. Ruszinkó, M., On the upper bound of the size of the r-cover-free families (1994) J. Combin. Th. Ser. A, 66, pp. 302-310", "listPosition" : 33, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676919, "link" : "/api/reference/15676919", "label" : "34. Sang, Y., Shen, H., Privacy preserving set intersection based on bilinear groups (2008) ACSC, pp. 47-54", "listPosition" : 34, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676920, "link" : "/api/reference/15676920", "label" : "35. Stern, L.A., Taylor, K., Social networking on Facebook (2007) J of the Comm., Speech & Theatre Association of ND, 20, pp. 9-20", "listPosition" : 35, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676921, "link" : "/api/reference/15676921", "label" : "36. Traud, A., Kelsic, E., Mucha, P., Porter, M., (2008) Community Structure in Online Collegiate Social Networks, , arXiv:0809.0960", "listPosition" : 36, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676922, "link" : "/api/reference/15676922", "label" : "37. Troncoso-Pastoriza, J.R., Katzenbeisser, S., Celik, M., Privacy preserving error resilient DNA searching through oblivious automata (2007) ACM CCS, pp. 519-528", "listPosition" : 37, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676923, "link" : "/api/reference/15676923", "label" : "38. Vaidya, J., Clifton, C., Secure set intersection cardinality with application to association rule mining (2005) Journal of Computer Security, 13 (4), pp. 593-622", "listPosition" : 38, "published" : false, "snippet" : true }, { "otype" : "Reference", "mtid" : 15676924, "link" : "/api/reference/15676924", "label" : "39. Yao, A.C., Protocols for secure computations (1982) FOCS, pp. 160-164", "listPosition" : 39, "published" : false, "snippet" : true } ], "hasCitationDuplums" : false, "userChangeableUntil" : "2017-12-31T23:00:00.000+0000", "publishDate" : "2013-01-23T23:00:10.000+0000", "directInstitutesForSort" : "", "ownerAuthorCount" : 1, "ownerInstituteCount" : 15, "directInstituteCount" : 0, "authorCount" : 2, "contributorCount" : 0, "book" : { "otype" : "Book", "mtid" : 30100575, "link" : "/api/publication/30100575", "label" : "9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10. (2010) ISBN:9781450300964", "core" : false, "citation" : false, "publicationPending" : false, "type" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "subType" : { "otype" : "SubType", "mtid" : 10000144, "link" : "/api/subtype/10000144", "label" : "Konferenciakötet (Könyv)", "name" : "Konferenciakötet", "nameEng" : "Conference proceedings", "docType" : { "otype" : "PublicationType", "mtid" : 23, "link" : "/api/publicationtype/23", "label" : "Könyv", "code" : 23, "otypeName" : "Book", "listPosition" : 3, "published" : true, "oldId" : 23, "snippet" : true }, "listPosition" : 345, "published" : true, "oldId" : 10000144, "snippet" : true }, "category" : { "otype" : "Category", "mtid" : 1, "link" : "/api/category/1", "label" : "Tudományos", "published" : true, "oldId" : 1, "snippet" : true }, "languages" : [ { "otype" : "Language", "mtid" : 10002, "link" : "/api/language/10002", "label" : "Angol", "name" : "Angol", "nameEng" : "English", "published" : true, "oldId" : 2, "snippet" : true } ], "title" : "9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10", "identifiers" : [ { "otype" : "PublicationIdentifier", "mtid" : 5700979, "link" : "/api/publicationidentifier/5700979", "label" : "ISBN: 9781450300964", "source" : { "otype" : "PlainSource", "mtid" : 122, "link" : "/api/publicationsource/122", "label" : "ISBN", "type" : { "otype" : "PublicationSourceType", "mtid" : 10002, "link" : "/api/publicationsourcetype/10002", "label" : "Egyéb", "mayHaveOa" : false, "published" : true, "snippet" : true }, "name" : "ISBN", "nameEng" : "ISBN", "linkPattern" : "https://www.worldcat.org/search?q=isbn%3A@@@", "publiclyVisible" : true, "published" : true, "oldId" : 122, "snippet" : true }, "idValue" : "9781450300964", "realUrl" : "https://www.worldcat.org/search?q=isbn%3A9781450300964", "published" : false, "snippet" : true } ], "publishedAt" : [ { "otype" : "City", "mtid" : 25722, "link" : "/api/city/25722", "label" : "Chicago, Amerikai Egyesült Államok", "partOf" : { "otype" : "Country", "mtid" : 10017, "link" : "/api/country/10017", "label" : "Amerikai Egyesült Államok", "published" : true, "oldId" : 13, "snippet" : true }, "published" : true, "snippet" : true } ], "publishedYear" : 2010, "foreignEdition" : true, "foreignLanguage" : true, "fullPublication" : false, "conferencePublication" : true, "published" : true, "snippet" : true }, "hasQualityFactor" : false, "link" : "/api/publication/22832297", "label" : "Asuncion AU et al. Turning privacy leaks into floods: Surreptitious discovery of social network friendships and other sensitive binary attribute vectors Turning privacy leaks into floods: Surreptitious discovery of social network friendships and other sensitive binary attribute vectors. (2010) Megjelent: 9th Annual ACM Workshop on Privacy in the Electronic Society, WPES '10, Co-located with CCS'10 pp. 21-30", "template" : "