-
1
-
-
84856190322
-
-
Master's Thesis, EPFL , Lausanne, Switzerland
-
Y. Afify, "Access control in a peer-to-peer social network, " Master's thesis, EPFL, Lausanne, Switzerland, 2008.
-
(2008)
Access Control in a Peer-to-Peer Social Network
-
-
Afify, Y.1
-
2
-
-
70450172971
-
Peerson: P2p social networking: Early experiences and insights
-
[Online], Available
-
S. Buchegger, D. Schïoberg, L.-H. Vu, and A. Datta, "Peerson: P2p social networking: early experiences and insights, " in Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, ser. SNS'09, 2009, pp. 46-52. [Online]. Available:http://doi.acm.org/10.1145/1578002.1578010.
-
(2009)
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, ser. SNS'09
, pp. 46-52
-
-
Buchegger, S.1
Schïoberg, D.2
Vu, L.-H.3
Datta, A.4
-
3
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
L. Cutillo, R. Molva, and T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust, " Communications Magazine, IEEE, vol. 47, no. 12, pp. 94 -101, 2009.
-
(2009)
Communications Magazine, IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
4
-
-
84856133401
-
On the security and feasibility of safebook: A distributed privacypreserving online social network
-
Springer Boston
-
L. Cutillo, R. Molva, and T. Strufe, "On the security and feasibility of safebook: A distributed privacypreserving online social network, " in Privacy and Identity Management for Life, ser. IFIP Advances in Information and Communication Technology. Springer Boston, 2010, vol. 320, pp. 86-101.
-
(2010)
Privacy and Identity Management for Life, ser. IFIP Advances in Information and Communication Technology
, vol.320
, pp. 86-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
5
-
-
84856206918
-
-
Apr., [Online]. Available
-
(2010, Apr.) A little more about the project. [Online]. Available: http://blog.joindiaspora.com/2010/04/21/a-little-more-aboutthe-project.html.
-
(2010)
A Little More about the Project
-
-
-
6
-
-
84856141769
-
-
Nov., [Online]. Available
-
(2010, Nov.) Diaspora security architecture proposal. [Online]. Available: https://github.com/diaspora/diaspora/wiki/Security-Architecture- Proposal.
-
(2010)
Diaspora Security Architecture Proposal
-
-
-
7
-
-
84856137805
-
-
Oct, [Online]. Available
-
(2010, Oct.) Encryption. [Online]. Available: https://github.com/ diaspora/diaspora/wiki/Encryption.
-
(2010)
Encryption
-
-
-
8
-
-
84856141768
-
-
Aug, [Online]. Available
-
(2011, Aug.) Diaspora's federation protocol. [Online]. Available: https://github.com/diaspora/diaspora/wiki/Diaspora%27sfederation-protocol.
-
(2011)
Diaspora's Federation Protocol
-
-
-
9
-
-
84856141767
-
-
July, [Online]. Available
-
(2011, July) Diaspora roadmap. [Online]. Available: https://github.com/ diaspora/diaspora/wiki/Roadmap.
-
(2011)
Diaspora Roadmap
-
-
-
10
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
August, [Online], Available
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: an online social network with user-defined privacy, " SIGCOMM Comput. Commun. Rev., vol. 39, pp. 135-146, August 2009. [Online]. Available: http://doi.acm.org/10.1145/1594977.1592585.
-
(2009)
SIGCOMM Comput. Commun. Rev.
, vol.39
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
11
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proceedings of the 13th ACM conference on Computer and communications security, ser. CCS'06. ACM, 2006, pp. 89-98. (Pubitemid 47131359)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
12
-
-
38149121099
-
Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys
-
ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg
-
C. Delerable, P. Paillier, and D. Pointcheval, "Fully collusion secure dynamic broadcast encryption with constant-size ciphertexts or decryption keys, " in Pairing-Based Cryptography Pairing 2007, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2007, vol. 4575, pp. 39-59.
-
(2007)
Pairing-Based Cryptography Pairing 2007
, vol.4575
, pp. 39-59
-
-
Delerable, C.1
Paillier, P.2
Pointcheval, D.3
-
13
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for ssl
-
ACM
-
V. Gupta, S. Gupta, S. Chang, and D. Stebila, "Performance analysis of elliptic curve cryptography for ssl, " in Proceedings of the 1st ACM workshop on Wireless security, ser. WiSE'02. ACM, 2002, pp. 87-94.
-
(2002)
Proceedings of the 1st ACM workshop on Wireless security, ser. WiSE'02
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
Stebila, D.4
-
14
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
IEEE Computer Society, [Online], Available
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption, " in Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP'07. IEEE Computer Society, 2007, pp. 321-334. [Online]. Available: http://dx.doi.org/10.1109/SP.2007.11.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy, ser. SP'07
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
15
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, " in Public Key Cryptography PKC 2011, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2011, vol. 6571, pp. 53-70.
-
(2011)
Public Key Cryptography PKC 2011
, vol.6571
, pp. 53-70
-
-
Waters, B.1
-
16
-
-
70350630621
-
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
-
Springer-Verlag
-
L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, "Efficient and provable secure ciphertext-policy attribute-based encryption schemes, " in Proceedings of the 5th International Conference on Information Security Practice and Experience, ser. ISPEC'09. Springer-Verlag, 2009, pp. 1-12.
-
(2009)
Proceedings of the 5th International Conference on Information Security Practice and Experience, ser. ISPEC'09
, pp. 1-12
-
-
Ibraimi, L.1
Tang, Q.2
Hartel, P.3
Jonker, W.4
-
17
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
New York, NY, USA, [Online]. Available
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures, " in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS'07, New York, NY, USA, 2007, pp. 195-203. [Online]. Available: http://doi.acm.org/10.1145/1315245. 1315270.
-
(2007)
Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS'07
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
18
-
-
78650382848
-
An efficient dynamic identity-based broadcast encryption scheme
-
H. Jiang, Q. Xu, and J. Shang, "An efficient dynamic identity-based broadcast encryption scheme, " in Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on, 2010, pp. 27 -32.
-
(2010)
Data, Privacy and E-Commerce (ISDPE), 2010 Second International Symposium on
, pp. 27-32
-
-
Jiang, H.1
Xu, Q.2
Shang, J.3
-
19
-
-
38149117029
-
Identity-based broadcast encryption with constant size ciphertexts and private keys
-
ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg
-
C. Delerable, "Identity-based broadcast encryption with constant size ciphertexts and private keys, " in Advances in Cryptology ASIACRYPT 2007, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2007, vol. 4833, pp. 200-215.
-
(2007)
Advances in Cryptology ASIACRYPT 2007
, vol.4833
, pp. 200-215
-
-
Delerable, C.1
-
20
-
-
77958605406
-
Identity-based broadcast encryption with recipient privacy
-
W. Zhang, Q. Xu, and P. He, "Identity-based broadcast encryption with recipient privacy, " in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, vol. 8, 2010, pp. 483 -487.
-
(2010)
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
, vol.8
, pp. 483-487
-
-
Zhang, W.1
Xu, Q.2
He, P.3
|