-
4
-
-
33750065702
-
Privacy in encrypted content distribution using private broadcast encryption
-
Di Crescenzo, G., Rubin, A. (eds.) FC 2006. Springer, Heidelberg
-
Barth, A., Boneh, D., Waters, B.: Privacy in encrypted content distribution using private broadcast encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52-64. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4107
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
5
-
-
70849112460
-
Security and trust through electronic social network-based interactions
-
Bichsel, P., Müller, S., Preiss, F.-S., Sommer, D., Verdicchio, M.: Patrik Bichsel, Samuel Müller, Franz-Stefan Preiss, Dieter Sommer, and Mario Verdicchio. Security and trust through electronic social network-based interactions. In: IEEE International Conference on Computational Science and Engineering, vol. 4, pp. 1002-1007 (2009)
-
(2009)
IEEE International Conference on Computational Science and Engineering
, vol.4
, pp. 1002-1007
-
-
Bichsel, P.1
Müller, S.2
Preiss, F.-S.3
Sommer, D.4
Verdicchio, M.5
Bichsel, P.6
Müller, S.7
Preiss, F.-S.8
Sommer, D.9
Verdicchio, M.10
-
6
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
79952778904
-
Virtual private social networks
-
page to appear
-
Conti, M., Hasani, A., Crispo, B.: Virtual private social networks. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, ACM CODASPY 2011 (page to appear) (2011)
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy, ACM CODASPY 2011
-
-
Conti, M.1
Hasani, A.2
Crispo, B.3
-
13
-
-
70249088359
-
Noyb: Privacy in online social networks
-
ACM, New York
-
Guha, S., Tang, K., Francis, P.: Noyb: privacy in online social networks. In: WOSN 2008: Proceedings of the first workshop on Online social networks, pp. 49-54. ACM, New York (2008)
-
(2008)
WOSN 2008: Proceedings of the First Workshop on Online Social Networks
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
14
-
-
84902150233
-
Research challenges for enterprise cloud computing
-
abs/1001.3257
-
Khajeh-Hosseini, A., Sommerville, I., Sriram, I.: Research challenges for enterprise cloud computing. In: CoRR, abs/1001.3257 (2010)
-
(2010)
CoRR
-
-
Khajeh-Hosseini, A.1
Sommerville, I.2
Sriram, I.3
-
17
-
-
70849131766
-
FaceCloak: An architecture for user privacy on social networking sites
-
IEEE, Los Alamitos
-
Luo, W., Xie, Q., Hengartner, U.: FaceCloak: An architecture for user privacy on social networking sites. In: 2009 International Conference on Computational Science and Engineering (CSE), vol. 3, pp. 26-33. IEEE, Los Alamitos (2009)
-
(2009)
2009 International Conference on Computational Science and Engineering (CSE)
, vol.3
, pp. 26-33
-
-
Luo, W.1
Xie, Q.2
Hengartner, U.3
-
19
-
-
85158903171
-
Facebook privacy: A bewilldering tangle of options
-
New York Times. Facebook privacy: A bewilldering tangle of options, http://www.nytimes.com/interactive/2010/05/12/business/facebook-privacy.html
-
New York Times
-
-
-
20
-
-
78649284508
-
Audience segregation in social network sites
-
van den Berg, B., Leenes, R.: Audience segregation in social network sites. In: SocialCom/PASSAT, pp. 1111-1116 (2010)
-
(2010)
SocialCom/PASSAT
, pp. 1111-1116
-
-
Van Den Berg, B.1
Leenes, R.2
-
21
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of pgp 5.0
-
USENIX Association, Berkeley
-
Whitten, A., Tygar, J.D.: Why johnny can't encrypt: a usability evaluation of pgp 5.0. In: Proceedings of the 8th conference on USENIX Security Symposium, vol. 8, pp. 14-14. USENIX Association, Berkeley (1999)
-
(1999)
Proceedings of the 8th Conference on USENIX Security Symposium
, vol.8
, pp. 14-14
-
-
Whitten, A.1
Tygar, J.D.2
|