메뉴 건너뛰기




Volumn , Issue , 2009, Pages 419-428

Enabling secure secret sharing in distributed online social networks

Author keywords

Distributed online social networks; Online social networks; Secret sharing; Trust

Indexed keywords

ADVERSARY MODELS; BACK UP; COLLUSIVE ATTACK; DIFFERENT DISTRIBUTIONS; EXTENSIVE SIMULATIONS; NEW APPLICATIONS; PRIVATE KEY; SECRET SHARING; SOCIAL NETWORKS; SPREADING OF INFECTIONS; SYSTEM SECURITY; UNTRUSTED SERVER;

EID: 77950856297     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2009.46     Document Type: Conference Paper
Times cited : (34)

References (17)
  • 3
    • 77950796808 scopus 로고    scopus 로고
    • Privacy-aware collaborative access control in web-based social networks
    • B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. DBSec, 2008.
    • DBSec, 2008
    • Carminati, B.1    Ferrari, E.2
  • 6
    • 52049126397 scopus 로고    scopus 로고
    • Privacy homomorphisms for social networks with private relationships
    • in press, available online 11 July 2008
    • J. Domingo-Ferrer, A. Viejo, F. Sebe, and U. Gonzalez-Nicolas. Privacy homomorphisms for social networks with private relationships. Computer Networks (in press, available online 11 July 2008), 2008.
    • (2008) Computer Networks
    • Domingo-Ferrer, J.1    Viejo, A.2    Sebe, F.3    Gonzalez-Nicolas, U.4
  • 9
    • 33745204609 scopus 로고    scopus 로고
    • Experiences creating three implementations of the repast agent modeling toolkit
    • M. J. North, N. T. Collier, and J. R. Vos. Experiences creating three implementations of the repast agent modeling toolkit. ACM Trans. Model. Comput. Simul., 16(1):1-25, 2006.
    • (2006) ACM Trans. Model. Comput. Simul. , vol.16 , Issue.1 , pp. 1-25
    • North, M.J.1    Collier, N.T.2    Vos, J.R.3
  • 12
    • 34250306664 scopus 로고    scopus 로고
    • Threshold cryptography in p2p and manets: The case of access control
    • N. Saxena, G. Tsudik, and J. H. Yi. Threshold cryptography in p2p and manets: The case of access control. Comput. Netw., 51(12):3632-3649, 2007.
    • (2007) Comput. Netw. , vol.51 , Issue.12 , pp. 3632-3649
    • Saxena, N.1    Tsudik, G.2    Yi, J.H.3
  • 13
    • 0003855464 scopus 로고
    • (2nd ed.). John Wiley & Sons, Inc., New York, NY, USA
    • B. Schneier. Applied cryptography (2nd ed.). John Wiley & Sons, Inc., New York, NY, USA, 1995.
    • (1995) Applied Cryptography
    • Schneier, B.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0034782005 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup service for internet applications
    • New York, NY, USA, ACM Press
    • I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01, pages 149-160, New York, NY, USA, 2001. ACM Press.
    • (2001) SIGCOMM '01 , pp. 149-160
    • Stoica, I.1    Morris, R.2    Karger, D.3    Kaashoek, M.F.4    Balakrishnan, H.5
  • 16
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • June
    • D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440-442, June 1998.
    • (1998) Nature , vol.393 , Issue.6684 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.