“…This paper does not introduce any new privacy model or measure, but simply investigates, both theoretically and empirically, computational problems for a model that is published in "Information Sciences, 328, 403-417, 2016" (reference [43]). There have been several other subsequent papers investigating this privacy measure, e.g., see [9,44,49,34]. Thus, researchers in network privacy are certainly interested in this model or related computational complexity questions.…”