-
3
-
-
70249109203
-
Characterizing social cascades in Flickr
-
ACM
-
M. Cha, A. Mislove, B. Adams, and K. P. Gummadi, "Characterizing social cascades in Flickr," in WOSN. ACM, 2008.
-
(2008)
WOSN
-
-
Cha, M.1
Mislove, A.2
Adams, B.3
Gummadi, K.P.4
-
4
-
-
33749016498
-
Information revelation and privacy in online social networks (the Facebook case)
-
R. Gross and A. Acquisti, "Information revelation and privacy in online social networks (the Facebook case)," in WPES, 2005.
-
(2005)
WPES
-
-
Gross, R.1
Acquisti, A.2
-
7
-
-
84861536557
-
Google seeks to quell Buzz privacy outcry
-
Feb.
-
R. Waters, "Google seeks to quell Buzz privacy outcry," Financial Times, Feb. 2010.
-
(2010)
Financial Times
-
-
Waters, R.1
-
8
-
-
70450172971
-
Peer-SoN: P2P social networking - Early experiences and insights
-
S. Buchegger, D. Schiöberg, L. H. Vu, and A. Datta, "Peer-SoN: P2P social networking - early experiences and insights," in SNS, 2009.
-
(2009)
SNS
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.H.3
Datta, A.4
-
9
-
-
84894714314
-
-
"Diaspora*," https://joindiaspora.com/.
-
Diaspora*
-
-
-
10
-
-
81255134469
-
LotusNet: Tunable privacy for distributed online social network services
-
L. Aiello and G. Ruffo, "LotusNet: tunable privacy for distributed online social network services," Computer Communications, vol. 35, no. 1, pp. 75-88, 2012.
-
(2012)
Computer Communications
, vol.35
, Issue.1
, pp. 75-88
-
-
Aiello, L.1
Ruffo, G.2
-
11
-
-
74349102159
-
Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network
-
L. A. Cutillo, R. Molva, and T. Strufe, "Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network," in WOWMOM, 2009.
-
(2009)
WOWMOM
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
12
-
-
0003007594
-
Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems
-
A. Rowstron and P. Druschel, "Pastry: Scalable distributed object location and routing for large-scale peer-to-peer systems," in Middleware, 2001.
-
(2001)
Middleware
-
-
Rowstron, A.1
Druschel, P.2
-
13
-
-
2442421260
-
Kademlia: A peer-to-peer information system based on the xor metric
-
P. Maymounkov and D. Mazières, "Kademlia: A peer-to-peer information system based on the xor metric," in IPTPS, 2002.
-
(2002)
IPTPS
-
-
Maymounkov, P.1
Mazières, D.2
-
15
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach, "Secure routing for structured peer-to-peer overlay networks," in OSDI, 2002.
-
(2002)
OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
16
-
-
85076766975
-
Whanau: A Sybilproof distributed hash table
-
C. Lesniewski-Laas and M. F. Kaashoek, "Whanau: a Sybilproof distributed hash table," in NSDI, 2010.
-
(2010)
NSDI
-
-
Lesniewski-Laas, C.1
Kaashoek, M.F.2
-
17
-
-
30044442398
-
Denial-of-service resilience in peer-to-peer file sharing systems
-
D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," in ACM SIGMETRICS, 2005.
-
(2005)
ACM SIGMETRICS
-
-
Dumitriu, D.1
Knightly, E.2
Kuzmanovic, A.3
Stoica, I.4
Zwaenepoel, W.5
-
18
-
-
33947645385
-
Robust accounting in decentralized P2P storage systems
-
I. Osipkov, P. Wang, and N. Hopper, "Robust accounting in decentralized P2P storage systems," in ICDCS, 2006.
-
(2006)
ICDCS
-
-
Osipkov, I.1
Wang, P.2
Hopper, N.3
-
19
-
-
79952508072
-
Persona: An online social network with userdefined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: an online social network with userdefined privacy," in ACM SIGCOMM, 2009.
-
(2009)
ACM SIGCOMM
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
21
-
-
79956030125
-
EASiER: Encryption-based access control in social networks with efficient revocation
-
S. Jahid, P. Mittal, and N. Borisov, "EASiER: Encryption-based access control in social networks with efficient revocation," in ASIACCS, 2011.
-
(2011)
ASIACCS
-
-
Jahid, S.1
Mittal, P.2
Borisov, N.3
-
23
-
-
33751508709
-
-
NISsT, Tech. Rep. SP800-57
-
E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, "Recommendation for key management - part 1: General (revised)," NISsT, Tech. Rep. SP800-57, 2007.
-
(2007)
Recommendation for Key Management - Part 1: General (Revised)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
24
-
-
55149122075
-
Tempering Kademlia with a robust identity based system
-
L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella, "Tempering Kademlia with a robust identity based system," in P2P, 2008.
-
(2008)
P2P
-
-
Aiello, L.M.1
Milanesio, M.2
Ruffo, G.3
Schifanella, R.4
-
25
-
-
80051789956
-
An identity-based approach to secure P2P applications with Likir
-
-, "An identity-based approach to secure P2P applications with Likir," Peer-to-Peer Networking and Applications, vol. 4, pp. 420-438, 2011.
-
(2011)
Peer-to-Peer Networking and Applications
, vol.4
, pp. 420-438
-
-
Aiello, L.M.1
Milanesio, M.2
Ruffo, G.3
Schifanella, R.4
-
26
-
-
79959904021
-
A security API for distributed social networks
-
M. Backes, M. Maffei, and K. Pecina, "A security API for distributed social networks," in NDSS, 2011.
-
(2011)
NDSS
-
-
Backes, M.1
Maffei, M.2
Pecina, K.3
|