-
1
-
-
84995370788
-
Privacy, cost, and availability tradeoffs in decentralized osns
-
A. Shakimov, A. Varshavsky, L. P. Cox, and R. Cáceres, "Privacy, cost, and availability tradeoffs in decentralized osns," in Proc. of the WOSN, 2009.
-
Proc. of the WOSN, 2009
-
-
Shakimov, A.1
Varshavsky, A.2
Cox, L.P.3
Cáceres, R.4
-
2
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," in Proc. of the 7th Internet measurements conference, 2007.
-
Proc. of the 7th Internet Measurements Conference, 2007
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
3
-
-
70249088359
-
Noyb: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis, "Noyb: privacy in online social networks," in Proc. of the WOSP, Seattle, WA, USA, 2008.
-
Proc. of the WOSP, Seattle, WA, USA, 2008
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
4
-
-
84995488432
-
On the leakage of personally identifiable information via online social networks
-
B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," in Proc. of the WOSN, 2009.
-
Proc. of the WOSN, 2009
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
5
-
-
33847324622
-
Opendht: A public dht service and its uses
-
S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu, "Opendht: a public dht service and its uses," SIGCOMM Comput. Commun. Rev., vol. 35, no. 4, pp. 73-84, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.4
, pp. 73-84
-
-
Rhea, S.1
Godfrey, B.2
Karp, B.3
Kubiatowicz, J.4
Ratnasamy, S.5
Shenker, S.6
Stoica, I.7
Yu, H.8
-
8
-
-
10044221102
-
A greedy approximation for minimum connected dominating sets
-
L. Ruan, H. Du, X. Jia, W. Wu, Y. Li, and K.-I. Ko, "A greedy approximation for minimum connected dominating sets," Theoretical Computer Science, vol. 329, no. 1-3, pp. 325-330, 2004.
-
(2004)
Theoretical Computer Science
, vol.329
, Issue.1-3
, pp. 325-330
-
-
Ruan, L.1
Du, H.2
Jia, X.3
Wu, W.4
Li, Y.5
Ko, K.-I.6
-
9
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: a model for protecting privacy," Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst.
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
11
-
-
84883600279
-
Panacea: Tunable privacy for access controlled data in peer-to-peer systems
-
R. Narendula, T. G. Papaioannou, and K. Aberer, "Panacea: Tunable privacy for access controlled data in peer-to-peer systems," 2010, EPFL Technical Report 148337. http://infoscience.epfl.ch/record/148337.
-
(2010)
EPFL Technical Report 148337
-
-
Narendula, R.1
Papaioannou, T.G.2
Aberer, K.3
-
13
-
-
76749099371
-
Lockr: Better privacy for social networks
-
A. Tootoonchian, S. Saroiu, Y. Ganjali, and A. Wolman, "Lockr: better privacy for social networks," in Proc. of the CoNEXT, 2009.
-
Proc. of the CoNEXT, 2009
-
-
Tootoonchian, A.1
Saroiu, S.2
Ganjali, Y.3
Wolman, A.4
-
14
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: an online social network with user-defined privacy," in Proc. of the ACM SIGCOMM, 2009.
-
Proc. of the ACM SIGCOMM, 2009
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
15
-
-
70449667273
-
Flybynight: Mitigating the privacy risks of social networking
-
M. M. Lucas and N. Borisov, "Flybynight: mitigating the privacy risks of social networking," in Proc. of the WPES, 2008.
-
Proc. of the WPES, 2008
-
-
Lucas, M.M.1
Borisov, N.2
-
16
-
-
70450172971
-
Peerson: P2p social networking: early experiences and insights
-
S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta, "Peerson: P2p social networking: early experiences and insights," in Proc. of the ACM EuroSys Workshop on Social Network Systems, 2009.
-
Proc. of the ACM EuroSys Workshop on Social Network Systems, 2009
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.-H.3
Datta, A.4
-
17
-
-
57249110719
-
Tribler: A social-based peer-to-peer system: Research articles
-
J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips, "Tribler: a social-based peer-to-peer system: Research articles," Concurr. Comput. : Pract. Exper., vol. 20, no. 2, pp. 127-138, 2008.
-
(2008)
Concurr. Comput.: Pract. Exper.
, vol.20
, Issue.2
, pp. 127-138
-
-
Pouwelse, J.A.1
Garbacki, P.2
Wang, J.3
Bakker, A.4
Yang, J.5
Iosup, A.6
Epema, D.H.J.7
Reinders, M.8
Van Steen, M.R.9
Sips, H.J.10
-
18
-
-
77951284618
-
Practical security in p2p-based social networks
-
K. Graffi, P. Mukherjee, B. Menges, D. Hartung, A. Kovacevic, and R. Steinmetz, "Practical security in p2p-based social networks," in Proc. of the IEEE LCN, October 2009.
-
Proc. of the IEEE LCN, October 2009
-
-
Graffi, K.1
Mukherjee, P.2
Menges, B.3
Hartung, D.4
Kovacevic, A.5
Steinmetz, R.6
|