메뉴 건너뛰기




Volumn , Issue , 2006, Pages 89-97

Private social network analysis: How to assemble pieces of a graph privately

Author keywords

anonymity; graph; privacy; social networks

Indexed keywords

ANONYMITY; DISTRIBUTED SYSTEMS; GRAPH; LOCAL KNOWLEDGE; MALICIOUS NODES; ON-LINE COMMUNITIES; PRIVACY CONCERNS; PRIVACY THREATS;

EID: 84885209870     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179601.1179619     Document Type: Conference Paper
Times cited : (34)

References (27)
  • 1
    • 33749009103 scopus 로고    scopus 로고
    • The Perils and Promise of Online Schmoozing
    • February 20
    • J. Black. The Perils and Promise of Online Schmoozing. Business Week Online, February 20, 2004. http://yahoo.businessweek.com/technology/content/ feb2004/tc20040220 3260 tc073.htm
    • (2004) Business Week Online
    • Black, J.1
  • 3
    • 84885208431 scopus 로고    scopus 로고
    • Privacy preserving graph algorithms in the semi-honest model
    • To appear
    • J. Brickell and V. Shmatikov. Privacy preserving graph algorithms in the semi-honest model. In Proc. of Asiacrypt '05. To appear.
    • Proc. of Asiacrypt '05
    • Brickell, J.1    Shmatikov, V.2
  • 4
    • 0019532104 scopus 로고
    • UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS.
    • DOI 10.1145/358549.358563
    • D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. In Communications of the ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 5
    • 84990731886 scopus 로고    scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Proc. of CRYPTO'86
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of CRYPTO'86. LNCS 263, pp. 186-194.
    • LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 10
    • 85084162002 scopus 로고    scopus 로고
    • Making mix nets robust for electronic voting by randomized partial checking
    • M. Jakobsson, A. Juels, and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proc. of USENIX'02, pp. 339-353.
    • Proc. of USENIX'02 , pp. 339-353
    • Jakobsson, M.1    Juels, A.2    Rivest, R.3
  • 11
    • 84886430118 scopus 로고    scopus 로고
    • Efficient Oblivious Proofs of Correct Exponentiation
    • M. Jakobsson and C. Schnorr. Efficient Oblivious Proofs of Correct Exponentiation. In Proc. of CMS .99.
    • Proc. of CMS , pp. 99
    • Jakobsson, M.1    Schnorr, C.2
  • 13
    • 7644224668 scopus 로고    scopus 로고
    • Uncloaking terrorist networks
    • April
    • V. E. Krebs. Uncloaking terrorist networks. In First Monday, Vol. 7 (4), April 2002.
    • (2002) First Monday , vol.7 , Issue.4
    • Krebs, V.E.1
  • 14
    • 0035754862 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • A. Neff. A verifiable secret shuffle and its application to e-voting. In Proc. of ACM CCS '01, pp. 116-125.
    • Proc. of ACM CCS '01 , pp. 116-125
    • Neff, A.1
  • 16
    • 0000116106 scopus 로고    scopus 로고
    • Who is the best connected scientist? A study of scientific coauthorship networks
    • M. Newman. Who is the best connected scientist? A study of scientific coauthorship networks. In Phys Rev, E 64.
    • Phys Rev, E , vol.64
    • Newman, M.1
  • 17
    • 0002986502 scopus 로고    scopus 로고
    • Fault tolerant anonymous channel
    • Proc. of ICICS '97
    • W. Ogata, K. Kurosawa, K. Sako and K. Takatani. Fault tolerant anonymous channel. In Proc. of ICICS '97, pp. 440-444, 1997. LNCS 1334.
    • (1997) LNCS , vol.1334 , pp. 440-444
    • Ogata, W.1    Kurosawa, K.2    Sako, K.3    Takatani, K.4
  • 18
    • 84886435118 scopus 로고    scopus 로고
    • http://www.orgnet.com/
  • 19
    • 0000845043 scopus 로고    scopus 로고
    • A Threshold Cryptosystem Without a Trusted Third Party
    • Proc. of Eurocrypt '91
    • T. Pedersen. A Threshold Cryptosystem Without a Trusted Third Party. In Proc. of Eurocrypt '91, pp. 129-140. LNCS 547.
    • LNCS , vol.547 , pp. 129-140
    • Pedersen, T.1
  • 20
    • 0002997478 scopus 로고
    • Network analysis and computer-mediated communication systems
    • R. Rice. Network analysis and computer-mediated communication systems. In Advances in social network analysis, pp. 167-203. 1994.
    • (1994) Advances in Social Network Analysis , pp. 167-203
    • Rice, R.1
  • 21
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C.P. Schnorr. Efficient signature generation by smart cards. In Journal of Cryptology, 4:161.174, 1991.
    • (1991) Journal of Cryptology , vol.4
    • Schnorr, C.P.1
  • 23
    • 0012254042 scopus 로고    scopus 로고
    • The application of network analysis to criminal intelligence: An assessment of the prospects
    • M. K. Sparrow. The application of network analysis to criminal intelligence: an assessment of the prospects. In Social Networks, Vol. 13, pp. 251-274.
    • Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.K.1
  • 26
    • 0035860512 scopus 로고    scopus 로고
    • Computer networks as social networks
    • Sept
    • B. Wellman. Computer networks as social networks. In Science, 293, 14, Sept 2001, pp. 2031-34.
    • (2001) Science , vol.293 , Issue.14 , pp. 2031-2034
    • Wellman, B.1
  • 27
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • IEEE Computer Society
    • A. C. Yao. Protocols for secure computations. In FOCS'82, pp. 160-164. IEEE Computer Society, 1982.
    • (1982) FOCS'82 , pp. 160-164
    • Yao, A.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.