-
1
-
-
70450264618
-
-
A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In PET, 2006.
-
A. Acquisti and R. Gross. Imagined communities: Awareness, information sharing, and privacy on the facebook. In PET, 2006.
-
-
-
-
2
-
-
84869679024
-
-
Advanced crypto software collection
-
Advanced crypto software collection. http://acsc.csl.sri.com/cpabe/.
-
-
-
-
3
-
-
35348839742
-
Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing
-
S. Ahern, et al. Over-exposed?: privacy patterns and considerations in online and mobile photo sharing. In Human Factors in Computing Systems, 2007.
-
(2007)
Human Factors in Computing Systems
-
-
Ahern, S.1
-
4
-
-
84869665425
-
-
Apple iPhone SDK. http://developer.apple.com/iphone/.
-
Apple iPhone SDK
-
-
-
6
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 2002.
-
(2002)
Journal of Computer Security
-
-
Bonatti, P.A.1
Samarati, P.2
-
7
-
-
70450246502
-
-
M. Chase. Multi-authority attribute based encryption. In TCC, 2007.
-
M. Chase. Multi-authority attribute based encryption. In TCC, 2007.
-
-
-
-
8
-
-
84967701397
-
The design philosophy of the darpa internet protocols
-
D. Clark. The design philosophy of the darpa internet protocols. In SIGCOMM, 1988.
-
(1988)
SIGCOMM
-
-
Clark, D.1
-
10
-
-
84869667602
-
-
Facebook statistics
-
Facebook statistics. http://www.facebook.com/press/info.php?statistics.
-
-
-
-
13
-
-
33749016498
-
Information revelation and privacy in online social networks (the facebook case)
-
R. Gross and A. Acquisti. Information revelation and privacy in online social networks (the facebook case). In WPES, 2005.
-
(2005)
WPES
-
-
Gross, R.1
Acquisti, A.2
-
14
-
-
70249088359
-
NOYB: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In WOSN, 2008.
-
(2008)
WOSN
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
16
-
-
70450268671
-
-
J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In ISI, 2006.
-
J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In ISI, 2006.
-
-
-
-
17
-
-
36949018193
-
-
J. Kleinberg. Challenges in social network data: Processes, privacy and paradoxes. In KDD, 2007. Invited talk.
-
J. Kleinberg. Challenges in social network data: Processes, privacy and paradoxes. In KDD, 2007. Invited talk.
-
-
-
-
19
-
-
66549121418
-
A measure of online social networks
-
B. Krishnamurthy. A measure of online social networks. In COMSNETS, 2009.
-
(2009)
COMSNETS
-
-
Krishnamurthy, B.1
-
20
-
-
70249103846
-
Characterizing privacy in online social networks
-
B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In WOSN, 2008.
-
(2008)
WOSN
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
21
-
-
73349092246
-
Involuntary information leakage in social network services
-
I.-F. Lam, K.-T. Chen, and L.-J. Chen. Involuntary information leakage in social network services. In IWSEC, 2008.
-
(2008)
IWSEC
-
-
Lam, I.-F.1
Chen, K.-T.2
Chen, L.-J.3
-
22
-
-
70450272009
-
-
Y. Lee. Measured TCP performance in CDMA 1x EV-DO network. In PAM, 2006.
-
Y. Lee. Measured TCP performance in CDMA 1x EV-DO network. In PAM, 2006.
-
-
-
-
23
-
-
79959606137
-
Secure threshold multi authority attribute based encryption without a central authority
-
H. Lin, Z. Cao, X. Liang, and J. Shao. Secure threshold multi authority attribute based encryption without a central authority. In INDOCRYPT, 2008.
-
(2008)
INDOCRYPT
-
-
Lin, H.1
Cao, Z.2
Liang, X.3
Shao, J.4
-
24
-
-
84869682451
-
-
Linkedin. http://www.linkedin.com/.
-
Linkedin
-
-
-
25
-
-
84869676936
-
-
Loopt. http://www.loopt.com.
-
Loopt
-
-
-
26
-
-
70450244592
-
-
M. M. Lucas and N. Borisov. flybynight: Mitigating the privacy risks of social networking. In WPES, 2008.
-
M. M. Lucas and N. Borisov. flybynight: Mitigating the privacy risks of social networking. In WPES, 2008.
-
-
-
-
28
-
-
42149117427
-
-
A. Mislove, et al. Measurement and analysis of online social networks. In IMC, 2007.
-
A. Mislove, et al. Measurement and analysis of online social networks. In IMC, 2007.
-
-
-
-
29
-
-
70450226622
-
Growth of the ickr social network
-
A. Mislove, et al. Growth of the ickr social network. In WOSN, 2008.
-
(2008)
WOSN
-
-
Mislove, A.1
-
30
-
-
0003387819
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J. B. Lotspiech. Revocation and tracing schemes for stateless receivers. In CRYPTO, 2001.
-
(2001)
CRYPTO
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
32
-
-
33645998872
-
Fuzzy identity-based encryption
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In Eurocrypt, 2005.
-
(2005)
Eurocrypt
-
-
Sahai, A.1
Waters, B.2
-
33
-
-
85084164620
-
Detecting format-string vulnerabilities with type qualifiers
-
U. Shankar, et al. Detecting format-string vulnerabilities with type qualifiers. In USENIX Security, 2001.
-
(2001)
USENIX Security
-
-
Shankar, U.1
-
34
-
-
70450266732
-
-
A. Tootoonchian, et al. Lockr: Social access control for web 2.0. In WOSN, 2008.
-
A. Tootoonchian, et al. Lockr: Social access control for web 2.0. In WOSN, 2008.
-
-
-
-
35
-
-
85180804257
-
Realizing massive-scale conditional access systems through attribute-based cryptosystems
-
P. Traynor, K. Butler, W. Enck, and P. McDaniel. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In NDSS, 2008.
-
(2008)
NDSS
-
-
Traynor, P.1
Butler, K.2
Enck, W.3
McDaniel, P.4
-
36
-
-
84869670487
-
-
Where I've been. http://apps.facebook.com/whereivebeen/.
-
Where I've been
-
-
-
37
-
-
0032178082
-
Secure group communications using key graphs
-
28(4):68{79
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. SIGCOMM CCR, 28(4):68{79, 1998.
-
(1998)
SIGCOMM CCR
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
38
-
-
50249141898
-
Inferring privacy information via social relations
-
W. Xu, X. Zhou, and L. Li. Inferring privacy information via social relations. In ICDEW, 2008.
-
(2008)
ICDEW
-
-
Xu, W.1
Zhou, X.2
Li, L.3
-
39
-
-
77950788046
-
-
H. Yin, et al. Capturing system-wide information ow for malware detection and analysis. In CCS, 2007.
-
H. Yin, et al. Capturing system-wide information ow for malware detection and analysis. In CCS, 2007.
-
-
-
-
40
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. Transactions on Information and System Security, 2003.
-
(2003)
Transactions on Information and System Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|