-
2
-
-
33749016498
-
Information revelation and privacy in online social networks
-
ACM
-
R. Gross and A. Acquisti, "Information revelation and privacy in online social networks," in WPES. ACM, 2005, pp. 71-80.
-
(2005)
WPES
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
-
3
-
-
84865507939
-
Introducing traffic analysis
-
A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. D. C. di Vimercati, Eds. Auerbach, ch. 5
-
G. Danezis and R. Clayton, "Introducing traffic analysis," in Digital Privacy: Theory, Technologies, and Practices, A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. D. C. di Vimercati, Eds. Auerbach, 2007, ch. 5, pp. 95-116.
-
(2007)
Digital Privacy: Theory, Technologies, and Practices
, pp. 95-116
-
-
Danezis, G.1
Clayton, R.2
-
4
-
-
85013085594
-
Decentralized social networking services
-
L. Salgarelli, G. Bianchi, and N. Blefari-Melazzi, Eds. Springer, ch. 14
-
T. Paul, S. Buchegger, and T. Strufe, "Decentralized social networking services," in Trustworthy Internet, L. Salgarelli, G. Bianchi, and N. Blefari-Melazzi, Eds. Springer, 2011, ch. 14, pp. 187-199.
-
(2011)
Trustworthy Internet
, pp. 187-199
-
-
Paul, T.1
Buchegger, S.2
Strufe, T.3
-
5
-
-
78650709933
-
On the leakage of personally identifiable information via online social networks
-
B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," SIGCOMM Comput. Commun. Rev., vol. 40, pp. 112-117, 2010.
-
(2010)
SIGCOMM Comput. Commun. Rev.
, vol.40
, pp. 112-117
-
-
Krishnamurthy, B.1
Wills, C.E.2
-
7
-
-
77954007675
-
Secure and flexible framework for decentralized social network services
-
L. M. Aiello and G. Ruffo, "Secure and flexible framework for decentralized social network services," IEEE PERCOM, pp. 594-599, 2010.
-
(2010)
IEEE PERCOM
, pp. 594-599
-
-
Aiello, L.M.1
Ruffo, G.2
-
8
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
L. A. Cutillo, R. Molva, and T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
10
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: an online social network with user-defined privacy," SIGCOMM Comput. Commun. Rev., vol. 39, pp. 135-146, 2009.
-
(2009)
SIGCOMM Comput. Commun. Rev.
, vol.39
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
11
-
-
84861559798
-
Encryption for peer-to-peer social networks
-
O. Bodriagov and S. Buchegger, "Encryption for peer-to-peer social networks," in IEEE SPSN, 2011.
-
(2011)
IEEE SPSN
-
-
Bodriagov, O.1
Buchegger, S.2
-
12
-
-
84995514651
-
Privacy-enabling social networking over untrusted networks
-
ACM
-
J. Anderson, C. Diaz, J. Bonneau, and F. Stajano, "Privacy-enabling social networking over untrusted networks," in WOSN. ACM, 2009.
-
(2009)
WOSN
-
-
Anderson, J.1
Diaz, C.2
Bonneau, J.3
Stajano, F.4
-
15
-
-
83055174716
-
I know where you are and what you are sharing: Exploiting P2P communications to invade users' privacy
-
S. L. Blond, Z. Chao, A. Legout, K. Ross, and W. Dabbous, "I know where you are and what you are sharing: Exploiting P2P communications to invade users' privacy," in Internet Measurement Conf., 2011.
-
Internet Measurement Conf., 2011
-
-
Blond, S.L.1
Chao, Z.2
Legout, A.3
Ross, K.4
Dabbous, W.5
|