-
1
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: an online social network with user-defined privacy," Proc. ACM SIGCOMM, Aug. 2009.
-
Proc. ACM SIGCOMM, Aug. 2009
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
2
-
-
70249088359
-
NOYB: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis, "NOYB: privacy in online social networks," An ACM SIGCOMM 2008 Workshop (WOSN'08), pp. 49-54, 2008.
-
(2008)
An ACM SIGCOMM 2008 Workshop (WOSN'08)
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
3
-
-
70249132568
-
Photo-based authentication using social networks
-
Aug.
-
S. Yardi, N. Feamster, and A. Bruckman, "Photo-based authentication using social networks," An ACM SIGCOMM 2008 Workshop (WOSN'08), pp. 55-59, Aug. 2008.
-
(2008)
An ACM SIGCOMM 2008 Workshop (WOSN'08)
, pp. 55-59
-
-
Yardi, S.1
Feamster, N.2
Bruckman, A.3
-
4
-
-
52049126397
-
Privacy homomorphisms for social networks with private relationship
-
J. D.-Ferrer, A. Viejo, F. Sebé, and Ú. G.-Nicolás, "Privacy homomorphisms for social networks with private relationship," Comput. Netw., pp. 3007-3016, 2008.
-
(2008)
Comput. Netw.
, pp. 3007-3016
-
-
D-Ferrer, J.1
Viejo, A.2
Sebé, F.3
G-Nicolás, Ú.4
-
5
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
Dec
-
L. A. Cutillo and R. Molva, "Safebook: a privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, Dec. 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.A.1
Molva, R.2
-
6
-
-
70450172971
-
PeerSoN: P2p social networking
-
S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta, "PeerSoN: p2p social networking," Proc. 2nd ACM EuroSys Workshop on Social Network Systems, pp. 46-52, 2009.
-
(2009)
Proc. 2nd ACM EuroSys Workshop on Social Network Systems
, pp. 46-52
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.-H.3
Datta, A.4
-
8
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
Oct
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: a near-optimal social network defense against sybil attacks," in Proc. IEEE Symposium on Security and Privacy, pp. 3-17, Oct. 2008.
-
(2008)
Proc. IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
9
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "Sybilguard: defending against sybil attacks via social networks," SIGCOMM, Computing Communication Review, vol. 36, no. 4, pp. 267-278, 2006.
-
(2006)
SIGCOMM, Computing Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
10
-
-
50249117750
-
On the impact of social network profiling on anonymity
-
N. Borisov and I. Goldberg (Eds.): PETS 2008
-
C. Diaz, C. Troncoso, and A. Serjantov, On the impact of social network profiling on anonymity, in N. Borisov and I. Goldberg (Eds.): PETS 2008, LNCS 5134, 2008.
-
(2008)
LNCS
, vol.5134
-
-
Diaz, C.1
Troncoso, C.2
Serjantov, A.3
-
11
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
June
-
M. Reiter and A. Rubin, "Crowds: anonymity for web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, June 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.1
Rubin, A.2
-
14
-
-
84946840347
-
Identity-based encryption from the weil pairings
-
Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
-
D. Boneh and M. Franklin, Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp. 514- 532, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
84979291225
-
Broadcast Encryption
-
Advances in Cryptology: CRYPTO'93
-
A. Fiat and M. Naor, Broadcast Encryption, in Advances in Cryptology: CRYPTO'93, LNCS 773, 1993.
-
(1993)
LNCS
, vol.773
-
-
Fiat, A.1
Naor, M.2
-
16
-
-
35048901123
-
Public key encryption with keyword search
-
EUROCRYPT 2004 Springer
-
D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in EUROCRYPT 2004, LNCS 3027. Springer, 2004.
-
(2004)
LNCS
, vol.3027
-
-
Boneh, D.1
Crescenzo, G.D.2
Ostrovsky, R.3
Persiano, G.4
-
17
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
extended abstract in CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing. extended abstract in CRYPTO 2001," SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
19
-
-
34547240272
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
R. Curtmola, J. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in ACM Conference on Computer and Communications Security (CCS), 2006.
-
ACM Conference on Computer and Communications Security (CCS), 2006
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
21
-
-
0033705124
-
Practical techniques for searching on encrypted data
-
D. Song, D. Wagner, and A. Perrig, "Practical techniques for searching on encrypted data," in Proc. IEEE Symposium on Security and Privacy, pp. 44-55, 2000.
-
(2000)
Proc. IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.1
Wagner, D.2
Perrig, A.3
-
22
-
-
51349100827
-
A security architecture achieving anonymity and traceability in wireless mesh networks
-
Apr
-
J. Sun, C. Zhang, and Y. Fang, "A security architecture achieving anonymity and traceability in wireless mesh networks," IEEE Conf. on Computer Communications (INFOCOM), pp. 1687-1695, Apr. 2008.
-
(2008)
IEEE Conf. on Computer Communications (INFOCOM)
, pp. 1687-1695
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
23
-
-
67650383453
-
Defense against misbehavior in anonymous vehicular ad hoc networks
-
Nov
-
J. Sun and Y. Fang, "Defense against misbehavior in anonymous vehicular ad hoc networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1515-1525, Nov. 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1515-1525
-
-
Sun, J.1
Fang, Y.2
-
24
-
-
35248867510
-
Efficient identity-based signature schemes based on pairings
-
SAC 2002, Springer-Verlag
-
F. Hess, Efficient identity-based signature schemes based on pairings, SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2595
, pp. 310-324
-
-
Hess, F.1
-
25
-
-
84985922619
-
Tracing Traitors
-
Advances in Cryptology: CRYPTO'94
-
B. Chor, A. Fiat, and M. Naor, Tracing Traitors, in Advances in Cryptology: CRYPTO'94, LNCS 839, 1994.
-
(1994)
LNCS
, vol.839
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
26
-
-
84957617696
-
Threshold Traitor Tracing
-
Advances in Cryptology: CRYPTO'98
-
M. Naor and B. Pinkas, Threshold Traitor Tracing, in Advances in Cryptology: CRYPTO'98, LNCS 1462, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Naor, M.1
Pinkas, B.2
-
27
-
-
84957085257
-
An Efficient Public Key Traitor Tracing Scheme
-
Advances in Cryptology: CRYPTO'99
-
D. Boneh and M. Franklin, An Efficient Public Key Traitor Tracing Scheme, in Advances in Cryptology: CRYPTO'99, LNCS 1666, 1999.
-
(1999)
LNCS
, vol.1666
-
-
Boneh, D.1
Franklin, M.2
|