-
1
-
-
80052831413
-
Iran, facebook, and the limits of online activism
-
C. Abadi. Iran, facebook, and the limits of online activism. Foreign Policy, 2010. http://www.foreignpolicy.com/articles/2010/ 02/12/irans_failed_facebook_revolution.
-
(2010)
Foreign Policy
-
-
Abadi, C.1
-
4
-
-
77955437955
-
Anonymous webs of trust
-
Lecture Notes in Computer Science
-
M. Backes, S. Lorenz, M. Maffei, and K. Pecina. Anonymous webs of trust. In Proc. 10th Privacy Enhancing Technology Symposium (PETS), pages 130–148. Lecture Notes in Computer Science, 2010.
-
(2010)
Proc. 10th Privacy Enhancing Technology Symposium (PETS)
, pp. 130-148
-
-
Backes, M.1
Lorenz, S.2
Maffei, M.3
Pecina, K.4
-
6
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
IEEE Computer Society Press
-
M. Backes, M. Maffei, and D. Unruh. Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In Proc. 29th IEEE Symposium on Security & Privacy, pages 202–215. IEEE Computer Society Press, 2008.
-
(2008)
Proc. 29th IEEE Symposium on Security & Privacy
, pp. 202-215
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
7
-
-
51749088371
-
Computational soundness of symbolic zero-knowledge proofs against active attackers
-
IEEE Computer Society Press
-
M. Backes and D. Unruh. Computational soundness of symbolic zero-knowledge proofs against active attackers. In Proc. 21th IEEE Symposium on Computer Security Foundations (CSF), pages 255–269. IEEE Computer Society Press, 2008.
-
(2008)
Proc. 21th IEEE Symposium on Computer Security Foundations (CSF)
, pp. 255-269
-
-
Backes, M.1
Unruh, D.2
-
8
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
ACM Press
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An online social network with user-defined privacy. In Proc. 2009 ACM SIGCOMM conference on Data communication, pages 135–146. ACM Press, 2009.
-
(2009)
Proc. 2009 ACM SIGCOMM conference on Data communication
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
9
-
-
77949360517
-
Myfacetube politics: Social networking web sites and political engagement of young adults
-
February
-
J. C. Baumgartner and J. S. Morris. Myfacetube politics: Social networking web sites and political engagement of young adults. Social Science Computer Review, 28:24–44, February 2010.
-
(2010)
Social Science Computer Review
, vol.28
, pp. 24-44
-
-
Baumgartner, J. C.1
Morris, J. S.2
-
10
-
-
69949124606
-
Randomizable proofs and delegatable anonymous credentials
-
Springer-Verlag
-
M. Belenkiy, J. Camenisch, M. Chase, M. Kohlweiss, A. Lysyanskaya, and H. Shacham. Randomizable proofs and delegatable anonymous credentials. In Advances in Cryptology - CRYPTO 2009, volume 5677 of Lecture Notes in Computer Science, pages 108–125. Springer-Verlag, 2009.
-
(2009)
Advances in Cryptology - CRYPTO 2009, volume 5677 of Lecture Notes in Computer Science
, pp. 108-125
-
-
Belenkiy, M.1
Camenisch, J.2
Chase, M.3
Kohlweiss, M.4
Lysyanskaya, A.5
Shacham, H.6
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1988.
-
(1988)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
20
-
-
33745119040
-
Merkledamgård revisited: How to construct a hash function
-
Springer-Verlag
-
J.-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkledamgård revisited: How to construct a hash function. In Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science, pages 430–448. Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology - CRYPTO 2005, volume 3621 of Lecture Notes in Computer Science
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
21
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Springer-Verlag
-
R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology - CRYPTO 1994, volume 839 of Lecture Notes in Computer Science, pages 174–187. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO 1994, volume 839 of Lecture Notes in Computer Science
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
23
-
-
64849110666
-
Privacy preserving social networking through decentralization
-
IEEE Computer Society Press
-
L. A. Cutillo, R. Molva, and T. Strufe. Privacy preserving social networking through decentralization. In Proc. 6th International Conference on Wireless On-Demand Network Systems and Services, WONS’09, pages 133–140. IEEE Computer Society Press, 2009.
-
(2009)
Proc. 6th International Conference on Wireless On-Demand Network Systems and Services, WONS’09
, pp. 133-140
-
-
Cutillo, L. A.1
Molva, R.2
Strufe, T.3
-
24
-
-
84885887648
-
-
W. Dai. Crypto++. http://www.cryptopp.com/benchmarks.html.
-
Crypto++
-
-
Dai, W.1
-
27
-
-
77955354815
-
Iranian crackdown goes global
-
F. Fassihi. Iranian crackdown goes global. The Wall Street Journal, 2009. http://online.wsj.com/article/SB125978649644673331.html.
-
(2009)
The Wall Street Journal
-
-
Fassihi, F.1
-
31
-
-
71149116146
-
Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
-
O. Goldreich, S. Micali, and A. Wigderson. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM, 38(3):690–728, 1991.
-
(1991)
Journal of the ACM
, vol.38
, Issue.3
, pp. 690-728
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
32
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2):39–41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D. M.1
Reed, M. G.2
Syverson, P. F.3
-
33
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, 18(1):186–208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
35
-
-
85180628439
-
-
https://secure.wikimedia.org/wikipedia/en/wiki/Key_signing_party.
-
-
-
-
36
-
-
51649110861
-
Pseudo trust: Zero-knowledge authentication in anonymous p2ps
-
L. Lu, J. Han, Y. Liu, L. Hu, J.-P. Huai, L. Ni, and J. Ma. Pseudo trust: Zero-knowledge authentication in anonymous p2ps. IEEE Transactions on Parallel Distributed Systems, 19(10):1325–1337, 2008.
-
(2008)
IEEE Transactions on Parallel Distributed Systems
, vol.19
, Issue.10
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.-P.5
Ni, L.6
Ma, J.7
-
37
-
-
71549134004
-
Privacy-preserving relationship path discovery in social networks
-
Springer-Verlag
-
G. Mezzour, A. Perrig, V. Gligor, and P. Papadimitratos. Privacy-preserving relationship path discovery in social networks. In Proc. 8th International Conference on Cryptology and Network Security, pages 189–208. Springer-Verlag, 2009.
-
(2009)
Proc. 8th International Conference on Cryptology and Network Security
, pp. 189-208
-
-
Mezzour, G.1
Perrig, A.2
Gligor, V.3
Papadimitratos, P.4
-
38
-
-
85180622008
-
Foreign policy: Iran’s terrifying Facebook police
-
E. Morozov. Foreign policy: Iran’s terrifying Facebook police. National Public Radio, 2009. http://www.npr.org/templates/story/story.php?storyId=106535773.
-
(2009)
National Public Radio
-
-
Morozov, E.1
-
40
-
-
33751508709
-
-
NIST Special Publications
-
T. N. I. of Standards and Technology. Recommendataion for key management – part 1: General. NIST Special Publications, 800–57, 2007. http://csrc.nist.gov/groups/ST/toolkit/key_management.html.
-
(2007)
Recommendataion for key management – part 1: General
, pp. 800-857
-
-
-
41
-
-
85180627581
-
-
http://www.pgp.com/.
-
-
-
-
42
-
-
84860558359
-
Improve peer cooperation using social networks
-
V. Ponce, J. Wu, and X. Li. Improve peer cooperation using social networks. International Journal on Parallel, Emergent and Distributed Systems, 24(3):189–204, 2009.
-
(2009)
International Journal on Parallel, Emergent and Distributed Systems
, vol.24
, Issue.3
, pp. 189-204
-
-
Ponce, V.1
Wu, J.2
Li, X.3
-
43
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In Proc. 7th International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 552–565. Springer-Verlag, 2001.
-
(2001)
Proc. 7th International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science
, pp. 552-565
-
-
Rivest, R. L.1
Shamir, A.2
Tauman, Y.3
-
45
-
-
77953298166
-
A privacy-preserving scheme for online social networks with efficient revocation
-
IEEE Computer Society Press
-
J. Sun, X. Zhu, and Y. Fang. A privacy-preserving scheme for online social networks with efficient revocation. In Proc. 29th conference on Information communications, pages 2516–2524. IEEE Computer Society Press, 2010.
-
(2010)
Proc. 29th conference on Information communications
, pp. 2516-2524
-
-
Sun, J.1
Zhu, X.2
Fang, Y.3
-
46
-
-
70249086969
-
Do social networks improve e-commerce?: a study on social marketplaces
-
ACM
-
G. Swamynathan, C. Wilson, B. Boe, K. Almeroth, and B. Y. Zhao. Do social networks improve e-commerce?: a study on social marketplaces. In WOSP’08: Proceedings of the first workshop on Online social networks, pages 1–6. ACM, 2008.
-
(2008)
WOSP’08: Proceedings of the first workshop on Online social networks
, pp. 1-6
-
-
Swamynathan, G.1
Wilson, C.2
Boe, B.3
Almeroth, K.4
Zhao, B. Y.5
-
49
-
-
85180624220
-
-
http://www.facebook.com/.
-
-
-
-
51
-
-
76749099371
-
Lockr: Better privacy for social networks
-
ACM Press
-
A. Tootoonchian, S. Sarouis, Y. Ganjali, and A. Wolman. Lockr: Better privacy for social networks. In Proc. 5th International Conference on emerging Network Experiments and Technologies (CoNEXT), pages 169 – 180. ACM Press, 2009.
-
(2009)
Proc. 5th International Conference on emerging Network Experiments and Technologies (CoNEXT)
, pp. 169-180
-
-
Tootoonchian, A.1
Sarouis, S.2
Ganjali, Y.3
Wolman, A.4
-
52
-
-
85180633334
-
-
http://www.verisign.com/.
-
-
-
-
54
-
-
75649126342
-
Cairo activists use Facebook to rattle regime
-
D. Wolman. Cairo activists use Facebook to rattle regime. WIRED Magazine, 2008. http://www.wired.com/techbiz/startups/ magazine/16-11/ff_facebookegypt.
-
(2008)
WIRED Magazine
-
-
Wolman, D.1
|