-
1
-
-
84856146867
-
Throwing it all away: Community, data privacy and false choices of web 2.0
-
E. Edwards, "Throwing it all away: Community, data privacy and false choices of web 2.0, " Santa Clara Univ. Law School, Tech. Rep., 2008.
-
(2008)
Santa Clara Univ. Law School, Tech. Rep.
-
-
Edwards, E.1
-
2
-
-
77952200647
-
-
New Media & Society, May
-
H. L. Hundley, "US teenagers'perceptions and awareness of digital technology: a focus group approach, " New Media & Society, vol. 12, no. 3, pp. 417-433, May 2010.
-
(2010)
US Teenagers'Perceptions and Awareness of Digital Technology: A Focus Group Approach
, vol.12
, Issue.3
, pp. 417-433
-
-
Hundley, H.L.1
-
3
-
-
70249088359
-
NOYB: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis, "NOYB: privacy in online social networks, " in Proc. of the 1st workshop on Online social networks. ACM, 2008, p. 49-54.
-
(2008)
Proc. of the 1st Workshop on Online Social Networks. ACM
, pp. 49-54
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
4
-
-
70849131766
-
Facecloak: An architecture for user privacy on social networking sites
-
IEEE
-
W. Luo, Q. Xie, and U. Hengartner, "Facecloak: An architecture for user privacy on social networking sites, " in Intl. Conference on Computational Science and Engineering, vol. 3. IEEE, 2009, pp. 26 -33.
-
(2009)
Intl. Conference on Computational Science and Engineering
, vol.3
, pp. 26-33
-
-
Luo, W.1
Xie, Q.2
Hengartner, U.3
-
6
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: An online social network with user-defined privacy, " ACM SIGCOMM Computer Com. Review, vol. 39, no. 4, p. 135-146, 2009.
-
(2009)
ACM SIGCOMM Computer Com. Review
, vol.39
, Issue.4
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
7
-
-
70450172971
-
PeerSoN: P2P social networking: Early experiences and insights
-
S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, "PeerSoN: P2P social networking: early experiences and insights, " in Proc. of the 2nd ACM EuroSys Workshop on Social Network Systems, 2009, p. 46-52.
-
(2009)
Proc. of the 2nd ACM EuroSys Workshop on Social Network Systems
, pp. 46-52
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.H.3
Datta, A.4
-
8
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
IEEE
-
L. Cutillo, R. Molva, and T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust, " Communications Magazine, IEEE, vol. 47, no. 12, pp. 94-101, 2009.
-
(2009)
Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
9
-
-
79952556688
-
Vis-à-Vis: Privacy-Preserving online social networking via virtual individual servers
-
A. Shakimov, H. Lim, L. P. Cox, R. Cáceres, D. Liu, and A. Varshavsky, "Vis-à-Vis: Privacy-Preserving online social networking via virtual individual servers, " in Proc. of 3rd Intl. Conference on Communication Systems and Networks. IEEE, 2011.
-
(2011)
Proc. of 3rd Intl. Conference on Communication Systems and Networks. IEEE
-
-
Shakimov, A.1
Lim, H.2
Cox, L.P.3
Cáceres, R.4
Liu, D.5
Varshavsky, A.6
-
10
-
-
84870510126
-
Virtual individual servers as privacy-preserving proxies for mobile devices
-
R. Cáceres, L. Cox, H. Lim, A. Shakimov, and A. Varshavsky, "Virtual individual servers as privacy-preserving proxies for mobile devices, " in Proc. of the 1st ACM Workshop on Networking, systems, and applications for mobile handhelds, 2009, p. 37-42.
-
(2009)
Proc. of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds
, pp. 37-42
-
-
Cáceres, R.1
Cox, L.2
Lim, H.3
Shakimov, A.4
Varshavsky, A.5
-
11
-
-
77954708505
-
Content cloaking: Preserving privacy with google docs and other web applications
-
G. D'Angelo, F. Vitali, and S. Zacchiroli, "Content cloaking: preserving privacy with google docs and other web applications, " in Proc. of the 2010 ACM Symposium on Applied Computing, 2010, p. 826-830.
-
(2010)
Proc. of the 2010 ACM Symposium on Applied Computing
, pp. 826-830
-
-
D'angelo, G.1
Vitali, F.2
Zacchiroli, S.3
-
12
-
-
85018107502
-
Vanish: Increasing data privacy with self-destructing data
-
R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, "Vanish: Increasing data privacy with self-destructing data, " in USENIX Security Symposium. USENIX Association, 2009, pp. 299-316.
-
(2009)
USENIX Security Symposium. USENIX Association
, pp. 299-316
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.A.3
Levy, H.M.4
-
13
-
-
85180531810
-
Defeating vanish with low-cost sybil attacks against large DHTs
-
S. Wolchok, O. S. Hofmann, N. Heninger, E. W. Felten, J. A. Halderman, C. J. Rossbach, B. Waters, and E. Witchel, "Defeating vanish with low-cost sybil attacks against large DHTs, " in Proc. 17th Network and Distributed System Security Symposium (NDSS), 2010, p. 37-51.
-
(2010)
Proc. 17th Network and Distributed System Security Symposium (NDSS)
, pp. 37-51
-
-
Wolchok, S.1
Hofmann, O.S.2
Heninger, N.3
Felten, E.W.4
Halderman, J.A.5
Rossbach, C.J.6
Waters, B.7
Witchel, E.8
-
14
-
-
3042822164
-
P3P: Making privacy policies more useful
-
L. Cranor, "P3P: making privacy policies more useful, " IEEE Security & Privacy, vol. 1, no. 6, pp. 50-55, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.1
-
15
-
-
0037703521
-
Use of a P3P user agent by early adopters
-
L. F. Cranor, M. Arjula, and P. Guduru, "Use of a P3P user agent by early adopters, " in Proc. of the 2002 ACM workshop on Privacy in the Electronic Society. ACM, 2002, p. 1-10.
-
(2002)
Proc. of the 2002 ACM Workshop on Privacy in the Electronic Society. ACM
, pp. 1-10
-
-
Cranor, L.F.1
Arjula, M.2
Guduru, P.3
-
16
-
-
70350731253
-
A "nutrition label" for privacy
-
P. G. Kelley, J. Bresee, L. F. Cranor, and R. W. Reeder, "A "nutrition label" for privacy, " in Proc. of the 5th Symposium on Usable Privacy and Security. Mountain View, California: ACM, 2009, pp. 1-12.
-
(2009)
Proc. of the 5th Symposium on Usable Privacy and Security. Mountain View, California: ACM
, pp. 1-12
-
-
Kelley, P.G.1
Bresee, J.2
Cranor, L.F.3
Reeder, R.W.4
|