-
1
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 135-146 (2009)
-
(2009)
ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
2
-
-
33750065702
-
Privacy in Encrypted Content Distribution using Private Broadcast Encryption
-
Di Crescenzo, G., Rubin, A. (eds.) FC 2006. Springer, Heidelberg
-
Barth, A., Boneh, D., Waters, B.: Privacy in Encrypted Content Distribution using Private Broadcast Encryption. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 52-64. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4107
, pp. 52-64
-
-
Barth, A.1
Boneh, D.2
Waters, B.3
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Bethencourt, J., Sahai, A.,Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy (S&P 2007), pp. 321-334 (2007)
-
(2007)
IEEE Symposium on Security and Privacy (S&P 2007)
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
70450172971
-
PeerSoN: P2P social networking: early experiences and insights
-
Buchegger, S., Schiöberg, D., Vu, L.-H., Datta, A.: PeerSoN: P2P social networking: early experiences and insights. In: ACM EuroSys Workshop on Social Network Systems (SNS 2009), pp. 46-52 (2009)
-
(2009)
ACM EuroSys Workshop on Social Network Systems (SNS 2009)
, pp. 46-52
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.-H.3
Datta, A.4
-
5
-
-
0343701135
-
-
RFC 4880, Informational
-
Callas, J., Donnerhacke, L., Finney, H., Shaw, D., Thayer, R.: OpenPGP Message Format. RFC 4880, Informational (2007)
-
(2007)
OpenPGP Message Format
-
-
Callas, J.1
Donnerhacke, L.2
Finney, H.3
Shaw, D.4
Thayer, R.5
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: INFOCOM 1999, pp. 708-716 (1999)
-
(1999)
INFOCOM 1999
, pp. 708-716
-
-
Canetti, R.1
Garay, J.A.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
7
-
-
70350406398
-
Enforcing access control in web-based social networks
-
Carminati, B., Ferrari, E., Perego, A.: Enforcing access control in web-based social networks. ACM Transactions on Information and System Security 13(1) (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.13
, Issue.1
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
8
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
Consumer Communications and Networking Series
-
Cutillo, L.A., Molva, R., Strufe, T.: Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12) (2009); Consumer Communications and Networking Series
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
9
-
-
67650659197
-
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Gentry, C., Waters, B.: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 171-188. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 171-188
-
-
Gentry, C.1
Waters, B.2
-
10
-
-
77953303843
-
Walking in Facebook: A Case Study of Unbiased Sampling of OSNs
-
Gjoka, M., Kurant, M., Butts, C.T., Markopoulou, A.: Walking in Facebook: A Case Study of Unbiased Sampling of OSNs. In: INFOCOM 2010, pp. 2498-2506 (2010)
-
(2010)
INFOCOM 2010
, pp. 2498-2506
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
11
-
-
84876539605
-
Rhythms of social interaction: Messaging within a massive online network
-
Golder, S.A., Wilkinson, D.M., Huberman, B.A.: Rhythms of social interaction: Messaging within a massive online network. In: Communities and Technologies 2007, pp. 41-66 (2007)
-
(2007)
Communities and Technologies 2007
, pp. 41-66
-
-
Golder, S.A.1
Wilkinson, D.M.2
Huberman, B.A.3
-
12
-
-
77951284618
-
Practical security in p2p-based social networks
-
Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical security in p2p-based social networks. In: Annual IEEE Conference on Local Computer Networks (LCN 2009), pp. 269-272 (2009)
-
(2009)
Annual IEEE Conference on Local Computer Networks (LCN 2009)
, pp. 269-272
-
-
Graffi, K.1
Mukherjee, P.2
Menges, B.3
Hartung, D.4
Kovacevic, A.5
Steinmetz, R.6
-
13
-
-
62949139741
-
A distributed platform for multimedia communities
-
Graffi, K., Podrajanski, S., Mukherjee, P., Kovacevic, A., Steinmetz, R.: A distributed platform for multimedia communities. In: IEEE International Symposium on Multimedia (ISM 2008), pp. 208-213 (2008)
-
(2008)
IEEE International Symposium on Multimedia (ISM 2008)
, pp. 208-213
-
-
Graffi, K.1
Podrajanski, S.2
Mukherjee, P.3
Kovacevic, A.4
Steinmetz, R.5
-
15
-
-
84855424380
-
Cryptographic Treatment of Private User Profiles
-
ePrint Archive, Report 2011/064
-
Günther, F.,Manulis, M., Strufe, T.: Cryptographic Treatment of Private User Profiles. Cryptology ePrint Archive, Report 2011/064 (2011), http://eprint.iacr.org/2011/064
-
(2011)
Cryptology
-
-
Günther, F.1
Manulis, M.2
Strufe, T.3
-
16
-
-
79956030125
-
EASiER: Encryption-based access control in social networks with efficient revocation
-
Jahid, S., Mittal, P., Borisov, N.: EASiER: Encryption-based access control in social networks with efficient revocation. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 411-415 (2011)
-
(2011)
ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011)
, pp. 411-415
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
18
-
-
42149117427
-
Measurement and analysis of online social networks
-
Mislove, A., Marcon, M., Gummadi, P.K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: ACM SIGCOMM Conference on Internet Measurement 2007, pp. 29-42 (2007)
-
(2007)
ACM SIGCOMM Conference on Internet Measurement 2007
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, P.K.3
Druschel, P.4
Bhattacharjee, B.5
-
19
-
-
84863277693
-
-
September
-
PrimeLife. Scramble! (September 2010), http://www.primelife.eu/results/ opensource/65-scramble
-
(2010)
Scramble!
-
-
-
20
-
-
0038043478
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-
Sherman, A.T., McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Transactions on Software Engineering 29(5), 444-458 (2003)
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
21
-
-
76749099371
-
Lockr: Better privacy for social networks
-
Tootoonchian, A., Saroiu, S., Ganjali, Y., Wolman, A.: Lockr: better privacy for social networks. In: ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009), pp. 169-180 (2009)
-
(2009)
ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009)
, pp. 169-180
-
-
Tootoonchian, A.1
Saroiu, S.2
Ganjali, Y.3
Wolman, A.4
-
22
-
-
0003978251
-
-
RFC 2627, Informational
-
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures. RFC 2627, Informational (1999)
-
(1999)
Key Management for Multicast: Issues and Architectures
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
23
-
-
0032178082
-
Secure group communications using key graphs
-
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 1998, pp. 68-79 (1998)
-
(1998)
ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 1998
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
24
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: International Conference on World Wide Web (WWW2009), pp. 531-540 (2009)
-
(2009)
International Conference on World Wide Web (WWW2009)
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
-
25
-
-
79957848829
-
A Collaborative Framework for Privacy Protection in Online Social Networks
-
Zhu, Y., Hu, Z., Wang, H., Hu, H., Ahn, G.-J.: A Collaborative Framework for Privacy Protection in Online Social Networks. In: International Conference on Collaborative Computing (CollaborateCom 2010) (2010)
-
International Conference on Collaborative Computing (CollaborateCom 2010) (2010)
-
-
Zhu, Y.1
Hu, Z.2
Wang, H.3
Hu, H.4
Ahn, G.-J.5
|