메뉴 건너뛰기




Volumn , Issue , 2009, Pages 96-100

Privacy-preserving user clustering in a social network

Author keywords

CRY ENCR; SEC INTE; SEC PRIV

Indexed keywords

CLUSTER CENTERS; DATA SETS; FURTHER DEVELOPMENT; K CLUSTER; K-MEANS CLUSTERING; MULTIPLE USER; PERSONAL INFORMATION; PRIVACY CONCERNS; PRIVACY PRESERVING; SIMILAR INTERESTS; SOCIAL NETWORKS; USER DATA; USER PRIVACY;

EID: 77949788539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WIFS.2009.5386476     Document Type: Conference Paper
Times cited : (33)

References (14)
  • 1
    • 77949869689 scopus 로고    scopus 로고
    • Social networking: A quantitative and qualitative research report into attitudes, behaviours and use, Ofcom, April 2008, http://www.ofcom.org.uk/advice/media-literacy/medlitpub/medlitpubrss/ socialnetworking/report.pdf.
    • "Social networking: A quantitative and qualitative research report into attitudes, behaviours and use," Ofcom, April 2008, http://www.ofcom.org.uk/advice/media-literacy/medlitpub/medlitpubrss/ socialnetworking/report.pdf.
  • 2
    • 77949810978 scopus 로고    scopus 로고
    • InformIT, February
    • Shon Harris, "Security issues of social network sites," InformIT, February 2009, http://www.informit.com/blogs/blog.aspx?uk=Security- Issues-of-Social-Network-Sites.
    • (2009) Security issues of social network sites
    • Harris, S.1
  • 3
    • 77949819149 scopus 로고    scopus 로고
    • Monster attack steals user data,
    • August
    • "Monster attack steals user data," BBC News, August 2007, http://news.bbc.co.uk/2/hi/technology/6956349.stm.
    • (2007) BBC News
  • 9
    • 0022882770 scopus 로고    scopus 로고
    • A. C.-C. Yao, How to Generate and Exchange Secrets (Extended Abstract), in Annual Symposium on Foundations of Computer Science - FOCS '85. October 27-29, 1986, pp. 162-167, IEEE.
    • A. C.-C. Yao, "How to Generate and Exchange Secrets (Extended Abstract)," in Annual Symposium on Foundations of Computer Science - FOCS '85. October 27-29, 1986, pp. 162-167, IEEE.
  • 11
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Advances in Cryptology, J. Stern, Ed. May 2-6, of, Springer
    • P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," in Advances in Cryptology, J. Stern, Ed. May 2-6, 1999, vol. 1592 of LNCS, pp. 223-238, Springer.
    • (1999) LNCS , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 12
    • 38149074802 scopus 로고    scopus 로고
    • I. Damgård, M. Geisler, and M. Krøigaard, Efficient and Secure Comparison for On-Line Auctions, in Australasian Conference on Information Security and Privacy - ACSIP 2007. July 2-4, 2007, 4586 of LNCS, pp. 416-430, Springer.
    • I. Damgård, M. Geisler, and M. Krøigaard, "Efficient and Secure Comparison for On-Line Auctions," in Australasian Conference on Information Security and Privacy - ACSIP 2007. July 2-4, 2007, vol. 4586 of LNCS, pp. 416-430, Springer.
  • 13
    • 69949126271 scopus 로고    scopus 로고
    • A correction to "Efficient and secure comparison for on-line auctions
    • Cryptology ePrint Archive, Report 2008/321
    • I. Damgård, M. Geisler, and M. Krøigaard, "A correction to "Efficient and secure comparison for on-line auctions"," Cryptology ePrint Archive, Report 2008/321, 2008, http://eprint.iacr.org/.
    • (2008)
    • Damgård, I.1    Geisler, M.2    Krøigaard, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.