-
3
-
-
77950796808
-
Privacy-aware collaborative access control in web-based social networks
-
B. Carminati and E. Ferrari. Privacy-aware collaborative access control in web-based social networks. DBSec, 2008.
-
DBSec, 2008
-
-
Carminati, B.1
Ferrari, E.2
-
6
-
-
52049126397
-
Privacy homomorphisms for social networks with private relationships
-
in press, available online 11 July 2008
-
J. Domingo-Ferrer, A. Viejo, F. Sebe, and U. Gonzalez-Nicolas. Privacy homomorphisms for social networks with private relationships. Computer Networks (in press, available online 11 July 2008), 2008.
-
(2008)
Computer Networks
-
-
Domingo-Ferrer, J.1
Viejo, A.2
Sebe, F.3
Gonzalez-Nicolas, U.4
-
8
-
-
70450204803
-
Decentralization: The future of online social networking
-
C. A. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-Lee. Decentralization: The future of online social networking. In W3C Workshop on the Future of Social Networking Position Papers, 2009.
-
W3C Workshop on the Future of Social Networking Position Papers, 2009
-
-
Yeung, C.A.1
Liccardi, I.2
Lu, K.3
Seneviratne, O.4
Berners-Lee, T.5
-
9
-
-
33745204609
-
Experiences creating three implementations of the repast agent modeling toolkit
-
M. J. North, N. T. Collier, and J. R. Vos. Experiences creating three implementations of the repast agent modeling toolkit. ACM Trans. Model. Comput. Simul., 16(1):1-25, 2006.
-
(2006)
ACM Trans. Model. Comput. Simul.
, vol.16
, Issue.1
, pp. 1-25
-
-
North, M.J.1
Collier, N.T.2
Vos, J.R.3
-
10
-
-
38149134562
-
Secure content access and replication in pure p2p networks
-
E. Palomar, J. M. E. Tapiador, J. C. Hernandez-Castro, and A. Ribagorda. Secure content access and replication in pure p2p networks. Comput. Commun., 31(2):266-279, 2008.
-
(2008)
Comput. Commun.
, vol.31
, Issue.2
, pp. 266-279
-
-
Palomar, E.1
Tapiador, J.M.E.2
Hernandez-Castro, J.C.3
Ribagorda, A.4
-
12
-
-
34250306664
-
Threshold cryptography in p2p and manets: The case of access control
-
N. Saxena, G. Tsudik, and J. H. Yi. Threshold cryptography in p2p and manets: The case of access control. Comput. Netw., 51(12):3632-3649, 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3632-3649
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
13
-
-
0003855464
-
-
(2nd ed.). John Wiley & Sons, Inc., New York, NY, USA
-
B. Schneier. Applied cryptography (2nd ed.). John Wiley & Sons, Inc., New York, NY, USA, 1995.
-
(1995)
Applied Cryptography
-
-
Schneier, B.1
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
New York, NY, USA, ACM Press
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01, pages 149-160, New York, NY, USA, 2001. ACM Press.
-
(2001)
SIGCOMM '01
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
16
-
-
0032482432
-
Collective dynamics of 'small-world' networks
-
June
-
D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440-442, June 1998.
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
|