-
1
-
-
33749009103
-
The Perils and Promise of Online Schmoozing
-
February 20
-
J. Black. The Perils and Promise of Online Schmoozing. Business Week Online, February 20, 2004. http://yahoo.businessweek.com/technology/content/ feb2004/tc20040220 3260 tc073.htm
-
(2004)
Business Week Online
-
-
Black, J.1
-
3
-
-
84885208431
-
Privacy preserving graph algorithms in the semi-honest model
-
To appear
-
J. Brickell and V. Shmatikov. Privacy preserving graph algorithms in the semi-honest model. In Proc. of Asiacrypt '05. To appear.
-
Proc. of Asiacrypt '05
-
-
Brickell, J.1
Shmatikov, V.2
-
4
-
-
0019532104
-
UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS.
-
DOI 10.1145/358549.358563
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. In Communications of the ACM, 24(2):84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
5
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Proc. of CRYPTO'86
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of CRYPTO'86. LNCS 263, pp. 186-194.
-
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
6
-
-
0002929516
-
Studying online social networks
-
Garton, L., Haythornthwaite, C., and Wellman, B. (1997). Studying online social networks. Journal of Computer Mediated Communication, 3(1).
-
(1997)
Journal of Computer Mediated Communication
, vol.3
, Issue.1
-
-
Garton, L.1
Haythornthwaite, C.2
Wellman, B.3
-
10
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
M. Jakobsson, A. Juels, and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proc. of USENIX'02, pp. 339-353.
-
Proc. of USENIX'02
, pp. 339-353
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.3
-
11
-
-
84886430118
-
Efficient Oblivious Proofs of Correct Exponentiation
-
M. Jakobsson and C. Schnorr. Efficient Oblivious Proofs of Correct Exponentiation. In Proc. of CMS .99.
-
Proc. of CMS
, pp. 99
-
-
Jakobsson, M.1
Schnorr, C.2
-
13
-
-
7644224668
-
Uncloaking terrorist networks
-
April
-
V. E. Krebs. Uncloaking terrorist networks. In First Monday, Vol. 7 (4), April 2002.
-
(2002)
First Monday
, vol.7
, Issue.4
-
-
Krebs, V.E.1
-
14
-
-
0035754862
-
A verifiable secret shuffle and its application to e-voting
-
A. Neff. A verifiable secret shuffle and its application to e-voting. In Proc. of ACM CCS '01, pp. 116-125.
-
Proc. of ACM CCS '01
, pp. 116-125
-
-
Neff, A.1
-
16
-
-
0000116106
-
Who is the best connected scientist? A study of scientific coauthorship networks
-
M. Newman. Who is the best connected scientist? A study of scientific coauthorship networks. In Phys Rev, E 64.
-
Phys Rev, E
, vol.64
-
-
Newman, M.1
-
17
-
-
0002986502
-
Fault tolerant anonymous channel
-
Proc. of ICICS '97
-
W. Ogata, K. Kurosawa, K. Sako and K. Takatani. Fault tolerant anonymous channel. In Proc. of ICICS '97, pp. 440-444, 1997. LNCS 1334.
-
(1997)
LNCS
, vol.1334
, pp. 440-444
-
-
Ogata, W.1
Kurosawa, K.2
Sako, K.3
Takatani, K.4
-
18
-
-
84886435118
-
-
http://www.orgnet.com/
-
-
-
-
19
-
-
0000845043
-
A Threshold Cryptosystem Without a Trusted Third Party
-
Proc. of Eurocrypt '91
-
T. Pedersen. A Threshold Cryptosystem Without a Trusted Third Party. In Proc. of Eurocrypt '91, pp. 129-140. LNCS 547.
-
LNCS
, vol.547
, pp. 129-140
-
-
Pedersen, T.1
-
20
-
-
0002997478
-
Network analysis and computer-mediated communication systems
-
R. Rice. Network analysis and computer-mediated communication systems. In Advances in social network analysis, pp. 167-203. 1994.
-
(1994)
Advances in Social Network Analysis
, pp. 167-203
-
-
Rice, R.1
-
21
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.P. Schnorr. Efficient signature generation by smart cards. In Journal of Cryptology, 4:161.174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
-
-
Schnorr, C.P.1
-
23
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
M. K. Sparrow. The application of network analysis to criminal intelligence: an assessment of the prospects. In Social Networks, Vol. 13, pp. 251-274.
-
Social Networks
, vol.13
, pp. 251-274
-
-
Sparrow, M.K.1
-
26
-
-
0035860512
-
Computer networks as social networks
-
Sept
-
B. Wellman. Computer networks as social networks. In Science, 293, 14, Sept 2001, pp. 2031-34.
-
(2001)
Science
, vol.293
, Issue.14
, pp. 2031-2034
-
-
Wellman, B.1
-
27
-
-
0020312165
-
Protocols for secure computations
-
IEEE Computer Society
-
A. C. Yao. Protocols for secure computations. In FOCS'82, pp. 160-164. IEEE Computer Society, 1982.
-
(1982)
FOCS'82
, pp. 160-164
-
-
Yao, A.C.1
|