-
2
-
-
84995514651
-
Privacy-enabling social networking over untrusted networks
-
J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-enabling Social Networking over Untrusted Networks. In Proceedings of the 2nd ACM Workshop on Online Social Networks, pages 1-6, 2009.
-
(2009)
Proceedings of the 2nd ACM Workshop on Online Social Networks
, pp. 1-6
-
-
Anderson, J.1
Diaz, C.2
Bonneau, J.3
Stajano, F.4
-
3
-
-
70450257780
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: An Online Social Network With User-defined Privacy. In Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, pages 135-146, 2009.
-
(2009)
Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication
, pp. 135-146
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
5
-
-
57649174994
-
Facebook's privacy trainwreck: Exposure, invasion, and social convergence
-
D. Boyd. Facebook's Privacy Trainwreck: Exposure, Invasion, and Social Convergence. Convergence: The International Journal of Research into New Media Tec hn ol ogi e s, 14(1):13-20, 2008.
-
(2008)
Convergence: The International Journal of Research into New Media Technologies
, vol.14
, Issue.1
, pp. 13-20
-
-
Boyd, D.1
-
7
-
-
70450172971
-
PeerSoN: P2P social networking: Early experiences and insights
-
S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta. PeerSoN: P2P Social Networking: Early Experiences and Insights. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pages 46-52, 2009.
-
(2009)
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems
, pp. 46-52
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.-H.3
Datta, A.4
-
9
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
dec.
-
L. Cutillo, R. Molva, and T. Strufe. Safebook: A Privacy-preserving Online Social Network Leveraging on Real-life Trust. Communications Magazine, IEEE, 47(12):94-101, dec. 2009.
-
(2009)
Communications Magazine, IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
10
-
-
84892467344
-
Timing is everything?: The effects of timing and placement of online privacy indicators
-
ACM
-
S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the 27th ACM CHI'09, pages 319-328. ACM, 2009.
-
(2009)
Proceedings of the 27th ACM CHI'09
, pp. 319-328
-
-
Egelman, S.1
Tsai, J.2
Cranor, L.F.3
Acquisti, A.4
-
12
-
-
77954614450
-
Privacy wizards for social networking sites
-
L. Fang and K. LeFevre. Privacy Wizards for Social Networking Sites. In Proceedings of WWW'10, pages 351-360, 2010.
-
(2010)
Proceedings of WWW'10
, pp. 351-360
-
-
Fang, L.1
LeFevre, K.2
-
13
-
-
3042823619
-
Email-based identification and authentication: An alternative to PKI?
-
Nov.
-
S. Garfinkel. Email-based Identification and Authentication: An Alternative to PKI? IEEE Security and Privacy, 1(6):20-26, Nov. 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.6
, pp. 20-26
-
-
Garfinkel, S.1
-
19
-
-
84944878354
-
-
CRC Press, Inc., Boca Raton, FL, USA, 1st edition
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA, 1st edition, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
20
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST) October
-
National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES) (FIPS PUB 197), October 2001.
-
(2001)
Advanced Encryption Standard (AES) (FIPS PUB 197)
-
-
-
21
-
-
84864051477
-
-
uProtect.it
-
Reputation.com Inc. uProtect.it. http://uprotect.it, 2011.
-
(2011)
-
-
-
23
-
-
84890522850
-
Communication theory of secrecy systems
-
October
-
C. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28:656-715, October 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
26
-
-
84864039669
-
-
last access: 27.10.11
-
The Diaspora Project. http://diasporafoundation.org/ - last access: 27.10.11, 2011.
-
(2011)
The Diaspora Project
-
-
-
27
-
-
47549106092
-
Can you see me now? Audience and disclosure regulation in online social network sites
-
Z. Tufekci. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society, 28(1):20-36, 2008.
-
(2008)
Bulletin of Science, Technology & Society
, vol.28
, Issue.1
, pp. 20-36
-
-
Tufekci, Z.1
-
28
-
-
32244434492
-
Gathering evidence: Use of visual security cues in web browsers
-
Proceedings - Graphics Interface 2005
-
T. Whalen and K. M. Inkpen. Gathering Evidence: Use of Visual Security Cues in Web Browsers. In Proceedings of Graphics Interface 2005, pages 137-144. Canadian Human-Computer Communications Society, 2005. (Pubitemid 43211959)
-
(2005)
Proceedings - Graphics Interface
, pp. 137-144
-
-
Whalen, T.1
Inkpen, K.M.2
-
29
-
-
33745867321
-
Do security toolbars actually prevent phishing attacks?
-
CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI
-
M. Wu, R. C. Miller, and S. L. Garfinkel. Do Security Toolbars Actually Prevent Phishing Attacks? In Proceedings of the 24th ACM CHI '06, pages 601-610. ACM, 2006. (Pubitemid 44032148)
-
(2006)
Conference on Human Factors in Computing Systems - Proceedings
, vol.1
, pp. 601-610
-
-
Wu, M.1
Miller, R.C.2
Garfinkel, S.L.3
|