-
1
-
-
70450206356
-
Facebook and online privacy: Attitudes, behaviors, and unintended consequences
-
B. Debatin, J. P. Lovejoy et al., "Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences," Journal of Computer-Mediated Communication, vol. 15, pp. 83-108, 2009.
-
(2009)
Journal of Computer-Mediated Communication
, vol.15
, pp. 83-108
-
-
Debatin, B.1
Lovejoy, J.P.2
-
2
-
-
84920377156
-
-
checked 31/08/2014
-
http://linkd. in/1jaSeJK (all URLs checked 31/08/2014).
-
-
-
-
3
-
-
80052912569
-
Privacy in the age of google and facebook
-
C. Dwyer, "Privacy in the Age of Google and Facebook," Technology and Society Magazine, IEEE, vol. 30, no. 3, pp. 58-63, 2011.
-
(2011)
Technology and Society Magazine, IEEE
, vol.30
, Issue.3
, pp. 58-63
-
-
Dwyer, C.1
-
5
-
-
79952556688
-
Vis-a-Vis: Privacy-preserving online social networking via Virtual Individual Servers
-
A. Shakimov, H. Lim et al., "Vis-a-Vis: Privacy-preserving online social networking via Virtual Individual Servers," in COMSNETS'11.
-
COMSNETS'11
-
-
Shakimov, A.1
Lim, H.2
-
6
-
-
84920469174
-
Confidant: Protecting OSN Data without Locking it Up
-
D. Liu, A. Shakimov et al., "Confidant: Protecting OSN Data without Locking it Up," in Middleware '11.
-
Middleware '11
-
-
Liu, D.1
Shakimov, A.2
-
7
-
-
84858025733
-
SuperNova: Super-peers based Architecture for Decentralized Online Social Networks
-
R. Sharma and A. Datta, "SuperNova: Super-peers based Architecture for Decentralized Online Social Networks," in COMSNETS'12.
-
COMSNETS'12
-
-
Sharma, R.1
Datta, A.2
-
8
-
-
77958454798
-
Persona: An online social network with user-defined privacy
-
R. Baden, A. Bender et al., "Persona: An Online Social Network with User-defined Privacy," in SIGCOMM '09.
-
SIGCOMM '09
-
-
Baden, R.1
Bender, A.2
-
9
-
-
77955881883
-
Replica placement in p2p storage: Complexity and game theoretic analyses
-
K. Rzadca, A. Datta et al., "Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses," in ICDCS '10.
-
ICDCS '10
-
-
Rzadca, K.1
Datta, A.2
-
10
-
-
84872002349
-
Cachet: A decentralized architecture for privacy preserving social networking with caching
-
S. Nilizadeh, S. Jahid et al., "Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching," in CoNEXT'12.
-
CoNEXT'12
-
-
Nilizadeh, S.1
Jahid, S.2
-
11
-
-
72949088489
-
Safebook: A privacy-preserving online social network leveraging on real-life trust
-
L. Cutillo, R. Molva et al., "Safebook: A Privacy-Preserving Online Social Network Leveraging on Real-life Trust," Com. Mag., IEEE, vol. 47, no. 12, pp. 94-101, 2009.
-
(2009)
Com. Mag., IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
-
12
-
-
84920463344
-
Results from a Practical Deployment of the MyZone Decentralized P2P Social Network
-
A. Mahdian, R. Han et al., "Results from a Practical Deployment of the MyZone Decentralized P2P Social Network," CoRR, 2013.
-
(2013)
CoRR
-
-
Mahdian, A.1
Han, R.2
-
13
-
-
84958546246
-
ProofBook: An online social network based on proof-of-work and friend-propagation
-
Springer
-
S. Biedermann, N. P. Karvelas et al., "ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation," in SOFSEM'2014: Theory and Practice of Computer Science. Springer, 2014, pp. 114-125.
-
(2014)
SOFSEM'2014: Theory and Practice of Computer Science
, pp. 114-125
-
-
Biedermann, S.1
Karvelas, N.P.2
-
14
-
-
78149324869
-
Privacy-preserving p2p data sharing with oneswarm
-
T. Isdal, M. Piatek et al., "Privacy-preserving P2P Data Sharing with OneSwarm," in SIGCOMM'10.
-
SIGCOMM'10
-
-
Isdal, T.1
Piatek, M.2
-
15
-
-
13644274213
-
A survey of peer-to-peer content distribution technologies
-
S. Androutsellis-Theotokis and D. Spinellis, "A Survey of Peer-to-Peer Content Distribution Technologies," ACM Comput. Surv., vol. 36, pp. 335-371, 2004.
-
(2004)
ACM Comput. Surv.
, vol.36
, pp. 335-371
-
-
Androutsellis-Theotokis, S.1
Spinellis, D.2
-
16
-
-
83155184628
-
Exploiting node connection regularity for dht replication
-
A. Pace, V. Quema et al., "Exploiting Node Connection Regularity for DHT Replication," in SRDS'11.
-
SRDS'11
-
-
Pace, A.1
Quema, V.2
-
17
-
-
84864829717
-
Choosing partners based on availability in p2p networks
-
S. L. Blond, F. L. Fessant et al., "Choosing Partners Based on Availability in P2P Networks," ACM TAAS, vol. 7, no. 2, p. 25, 2012.
-
(2012)
ACM TAAS
, vol.7
, Issue.2
, pp. 25
-
-
Blond, S.L.1
Fessant, F.L.2
-
18
-
-
77956953218
-
Measuring user behavior in online social networks
-
L. Gyarmati and T. Trinh, "Measuring User Behavior in Online Social Networks," IEEE Network, vol. 24, no. 5, pp. 26-31, 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.5
, pp. 26-31
-
-
Gyarmati, L.1
Trinh, T.2
-
19
-
-
84907318036
-
Characterizing user behavior in online social networks
-
F. Benevenuto, T. Rodrigues et al., "Characterizing User Behavior in Online Social Networks," in IMC '09.
-
IMC '09
-
-
Benevenuto, F.1
Rodrigues, T.2
-
20
-
-
50249145728
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon et al., "Measurement and Analysis of Online Social Networks," in IMC '07.
-
IMC '07
-
-
Mislove, A.1
Marcon, M.2
-
21
-
-
84857214669
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai et al., "Ciphertext-Policy Attribute-Based Encryption," in IEEE SP '07.
-
IEEE SP '07
-
-
Bethencourt, J.1
Sahai, A.2
-
22
-
-
84893249232
-
User Interactions in Social Networks and their Implications
-
C. Wilson, B. Boe et al., "User Interactions in Social Networks and their Implications," in EuroSys'09.
-
EuroSys'09
-
-
Wilson, C.1
Boe, B.2
-
23
-
-
84874692167
-
Understanding Online Social Network Usage from a Network Perspective
-
F. Schneider, A. Feldmann et al., "Understanding Online Social Network Usage from a Network Perspective," in IMC'09.
-
IMC'09
-
-
Schneider, F.1
Feldmann, A.2
-
24
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post et al., "An Analysis of Social Network-based Sybil Defenses," in SIGCOMM'10.
-
SIGCOMM'10
-
-
Viswanath, B.1
Post, A.2
-
25
-
-
84995477295
-
On the evolution of user interaction in facebook
-
B. Viswanath, A. Mislove et al., "On the Evolution of User Interaction in Facebook," in WOSN'09.
-
WOSN'09
-
-
Viswanath, B.1
Mislove, A.2
-
27
-
-
84905985235
-
Understanding latent interactions in online social networks
-
J. Jiang, C. Wilson et al., "Understanding Latent Interactions in Online Social Networks," in IMC'10.
-
IMC'10
-
-
Jiang, J.1
Wilson, C.2
-
29
-
-
0003007594
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
A. I. T. Rowstron and P. Druschel, "Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems," in Middleware '01.
-
Middleware '01
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
31
-
-
84905970745
-
On the state of osn-based sybil defenses
-
D. Koll, J. Li et al., "On the State of OSN-based Sybil Defenses," in NETWORKING'14.
-
NETWORKING'14
-
-
Koll, D.1
Li, J.2
-
32
-
-
79960856007
-
Relationship Classification in Large Scale Online Social Networks and its Impact on Information Propagation
-
S. Tang, J. Yuan et al., "Relationship Classification in Large Scale Online Social Networks and its Impact on Information Propagation," in INFOCOM'11.
-
INFOCOM'11
-
-
Tang, S.1
Yuan, J.2
-
33
-
-
70849096006
-
Predicting tie strength with social media
-
E. Gilbert and K. Karahalios, "Predicting Tie Strength with Social Media," in CHI'09.
-
CHI'09
-
-
Gilbert, E.1
Karahalios, K.2
-
34
-
-
0037323073
-
Linear network coding
-
S.-Y. Li, R. Yeung et al., "Linear Network Coding," Inform. Theory, IEEE Trans. on, vol. 49, no. 2, pp. 371-381, 2003.
-
(2003)
Inform. Theory, IEEE Trans. on
, vol.49
, Issue.2
, pp. 371-381
-
-
Li, S.-Y.1
Yeung, R.2
-
35
-
-
77955726417
-
Network coding for distributed storage systems
-
A. Dimakis, P. Godfrey et al., "Network Coding for Distributed Storage Systems," Information Theory, IEEE Trans. on, vol. 56, no. 9, pp. 4539-4551, 2010.
-
(2010)
Information Theory, IEEE Trans. on
, vol.56
, Issue.9
, pp. 4539-4551
-
-
Dimakis, A.1
Godfrey, P.2
|