1. Backstrom, L., Dwork, C., Kleinberg, J.: Wherefore art thou r3579x? anonymized social networks, hidden patterns, and structural steganography. In: Int. Conf. on World Wide Web, pp. 181–190. ACM, New York (2007)
2. Barabási, A.-L., Albert, R.: Emergence of Scaling in Random Networks. Science 286(5439), 509–512 (1999)
3. Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. of the VLDB Endowment 2(1), 766–777 (2009)
4. Boldi, P., Bonchi, F., Gionis, A., Tassa, T.: Injecting Uncertainty in Graphs for Identity Obfuscation. Proc. of the VLDB Endowment 5(11), 1376–1387 (2012)
5. Bonchi, F., Gionis, A., Tassa, T.: Identity obfuscation in graphs through the information theoretic lens. In: Int. Conf. on Data Engineering, pp. 924–935. IEEE, Washington, DC (2011)