-
1
-
-
84898472634
-
A method for the protection of the message in social network service( sNS) using access control and hash-chain
-
Jeong, H., Won, D.: A method for the protection of the message in social network service( SNS) using access control and hash-chain. Journal of The Korea Institute of Information Security &Cryptology 1(23), 81-88 (2013)
-
(2013)
Journal of the Korea Institute of Information Security &Cryptology
, vol.1
, Issue.23
, pp. 81-88
-
-
Jeong, H.1
Won, D.2
-
2
-
-
84923200412
-
Dynamic user reliability evaluation scheme for social network service
-
Lee, C., Jung, Y., Jung, J.J., Won, D.: Dynamic User Reliability Evaluation Scheme for Social Network Service. Journal of The Korea Institute of Information Security &Cryptology 2(23), 157-168 (2013)
-
(2013)
Journal of the Korea Institute of Information Security &Cryptology
, vol.2
, Issue.23
, pp. 157-168
-
-
Lee, C.1
Jung, Y.2
Jung, J.J.3
Won, D.4
-
3
-
-
70450204803
-
Decentralization the future of online social networking
-
Yeung, C.A., Licaardi, L., Lu, K., Seneviratne, O., Lee, T.B.: Decentralization: The future of online social networking. In: Proc. Int. Joint Conf. W3C Workshop (2009)
-
(2009)
Proc. Int. Joint Conf. W3C Workshop
-
-
Yeung, C.A.1
Licaardi, L.2
Lu, K.3
Seneviratne, O.4
Lee, T.B.5
-
4
-
-
79957875212
-
Decentralized online social networks
-
Datta, A., Buchegger, S., Vu, L.H., Strufe, T., Rzadca, K.: Decentralized online social networks. In: Handbook of Social Network Technologies and Applications, pp. 349-378 (2010)
-
(2010)
Handbook of Social Network Technologies and Applications
, pp. 349-378
-
-
Datta, A.1
Buchegger, S.2
Vu, L.H.3
Strufe, T.4
Rzadca, K.5
-
5
-
-
64849110666
-
Privacy preserving social networking through decentralization
-
Cutillo, L.A., Molva, R., Strufe, T.: Privacy preserving social networking through decentralization. Wireless On-Demand Network Systems and Services, 145-152 (2009)
-
(2009)
Wireless On-Demand Network Systems and Services
, pp. 145-152
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
6
-
-
72949088489
-
Safebook a privacy-preserving online social network leveraging on real-life trust
-
Cutillo, L.A., Molva, R.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine 47(12), 94-101 (2009)
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.A.1
Molva, R.2
-
7
-
-
77954007675
-
Secure and flexible framework for decentralized social network services
-
Aiello, L.M., Ruffo, G.: Secure and flexible framework for decentralized social network services. In: IEEE PERCOM, pp. 594-599 (2010)
-
(2010)
IEEE PERCOM
, pp. 594-599
-
-
Aiello, L.M.1
Ruffo, G.2
-
8
-
-
70450172971
-
PeerSoN p2p social networking
-
Buchegger, S., Schioberg, D., Vu, L.-H., Datta, A.: PeerSoN: p2p social networking. In: Proc. 2nd ACM EuroSys Workshop on Social Network Systems, pp. 46-52 (2009)
-
(2009)
Proc. 2nd ACM EuroSys Workshop on Social Network Systems
, pp. 46-52
-
-
Buchegger, S.1
Schioberg, D.2
Vu, L.-H.3
Datta, A.4
-
9
-
-
81255134469
-
LotusNet tunable privacy for distributed online social network services
-
Aiello, L., Ruffo, G.: LotusNet: tunable privacy for distributed online social network services. Computer Communications 1(35), 75-88 (2012)
-
(2012)
Computer Communications
, vol.1
, Issue.35
, pp. 75-88
-
-
Aiello, L.1
Ruffo, G.2
-
10
-
-
38149117029
-
-
In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS. Springer, Heidelberg
-
Delerablee, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
-
(2007)
Identity-based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
, vol.4833
, pp. 200-215
-
-
Delerablee, C.1
-
11
-
-
78650382848
-
An efficient dynamic identity-based broadcast encryption scheme
-
Jiang, H., Xu, Q., Shang, J.: An efficient dynamic identity-based broadcast encryption scheme. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 27-32 (2010)
-
(2010)
2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE)
, pp. 27-32
-
-
Jiang, H.1
Xu, Q.2
Shang, J.3
-
12
-
-
84874324906
-
-
In: Kilian, J. (ed.) CRYPTO 2001. LNCS. Springer, Heidelberg
-
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
-
(2001)
Identity-Based Encryption from the Weil Pairing
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
13
-
-
84857928039
-
Security challenges and approaches in online social networks a survey
-
(August)
-
Ajami, R., Ramadan, N., Mohamed, N., Al-Jaroodi, J.: Security Challenges and Approaches in Online Social Networks: A Survey. International Journal of Computer Science and Network Security 11(8) (August 2011)
-
(2011)
International Journal of Computer Science and Network Security
, vol.11
, Issue.8
-
-
Ajami, R.1
Ramadan, N.2
Mohamed, N.3
Al-Jaroodi, J.4
-
14
-
-
84870302190
-
Ontology-based access control for social network systems
-
Masoumzadeh, A., Joshi, J.: Ontology-based access control for social network systems. IJIPSI 1(1), 59-78 (2011)
-
(2011)
IJIPSI
, vol.1
, Issue.1
, pp. 59-78
-
-
Masoumzadeh, A.1
Joshi, J.2
-
15
-
-
79961189950
-
-
In: Fischer-Hubner, S., Hopper, N. (eds.) PETS 2011. LNCS. Springer, Heidelberg
-
Beato, F., Kohlweiss, M., Wouters, K.: Scramble! Your Social Network Data. In: Fischer-Hubner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 211-225. Springer, Heidelberg (2011)
-
(2011)
Scramble! Your Social Network Data
, vol.6794
, pp. 211-225
-
-
Beato, F.1
Kohlweiss, M.2
Wouters, K.3
-
16
-
-
84898476664
-
An overview of privacy and security in sNS
-
Zilpelwar, R.A., Bedi, R.K., Wadhai, V.M.: An Overview of Privacy and Security in SNS. International Journal of P2P Network Trends and Technology 2(1) (2012)
-
(2012)
International Journal of P2P Network Trends and Technology
, vol.2
, Issue.1
-
-
Zilpelwar, R.A.1
Bedi, R.K.2
Wadhai, V.M.3
-
17
-
-
79960492102
-
A study of the perceptions of students on privacy and security on social networking sites(SNS) on the internet
-
(June)
-
Lawler, J.P.: A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites(SNS) on the Internet. Journal of Information Systems Applied Research 3(12) (June 2010)
-
(2010)
Journal of Information Systems Applied Research
, vol.3
, Issue.12
-
-
Lawler, J.P.1
-
18
-
-
84898447112
-
An expanded study of net generation perceptions on privacy and security on social networking sites(SNS)
-
(February)
-
Lawler, J.P., Molluzzo, J.C., Doshi, V.: An Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites(SNS). Information Systems Education Journal (February 2012)
-
(2012)
Information Systems Education Journal
-
-
Lawler, J.P.1
Molluzzo, J.C.2
Doshi, V.3
-
19
-
-
84865417403
-
Scalable group key exchange for securing distributed operating systems
-
Nam, J., Park, M., Han, S., Paik, J., Won, D.: Scalable Group Key Exchange for Securing Distributed Operating Systems. Journal of Information Science and Engineering 28(5), 829-857 (2012)
-
(2012)
Journal of Information Science and Engineering
, vol.28
, Issue.5
, pp. 829-857
-
-
Nam, J.1
Park, M.2
Han, S.3
Paik, J.4
Won, D.5
-
20
-
-
84876252922
-
Hybrid key management architecture for robust sCADA systems
-
(March)
-
Choi, D., Jeong, H., Won, D., Kim, S.: Hybrid Key Management Architecture for Robust SCADA Systems. Journal of Information Science and Engineering, 281-298 (March 2013)
-
(2013)
Journal of Information Science and Engineering
, pp. 281-298
-
-
Choi, D.1
Jeong, H.2
Won, D.3
Kim, S.4
|