-
1
-
-
83655202879
-
Stealing reality: When criminals become data scientists (or vice versa)
-
Altshuler Y, Aharony N, Elovici Y, Pentland A, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Int Syst 26(6):22-30
-
(2011)
IEEE Int Syst
, vol.26
, Issue.6
, pp. 22-30
-
-
Altshuler, Y.1
Aharony, N.2
Elovici, Y.3
Pentland, A.4
Cebrian, M.5
-
2
-
-
4243503752
-
-
American Management Association, New York
-
Anderson A, Cannell D, Gibbons T, Grote G, Henn J, Kennedy J, Muir M, Potter N, Whitby R(1966) An electronic cash and credit system. American Management Association, New York
-
(1966)
An Electronic Cash and Credit System
-
-
Anderson, A.1
Cannell, D.2
Gibbons, T.3
Grote, G.4
Henn, J.5
Kennedy, J.6
Muir, M.7
Potter, N.8
Whitby, R.9
-
4
-
-
35348848696
-
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
-
ACM, New York
-
Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, Banff. ACM, New York, pp 181-190
-
(2007)
Proceedings of the 16Th International Conference on World Wide Web, Banff
, pp. 181-190
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
5
-
-
0038483826
-
Emergence of scaling in random networks
-
Barabasi A, Albert R (1999) Emergence of scaling in random networks. Science286(5439):509-512
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.1
Albert, R.2
-
6
-
-
31444431866
-
The scaling laws of human travel
-
Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. Nature439(26):462-465
-
(2006)
Nature
, vol.439
, Issue.26
, pp. 462-465
-
-
Brockmann, D.1
Hufnagel, L.2
Geisel, T.3
-
8
-
-
65549085067
-
Power-law distributions in empirical data
-
Clauset A, Shalizi C, Newman M (2009) Power-law distributions in empirical data. SIAM Rev 51(4):661-703
-
(2009)
SIAM Rev
, vol.51
, Issue.4
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.2
Newman, M.3
-
9
-
-
78651237878
-
Inferring social ties from geographic coincidences
-
Crandall D, Backstrom L, Cosley D, Suri S, Huttenlocher D, Kleinberg J (2010) Inferring social ties from geographic coincidences. Proc Natl Acad Sci USA 107(52):22436
-
(2010)
Proc Natl Acad Sci USA
, vol.107
, Issue.52
, pp. 22436
-
-
Crandall, D.1
Backstrom, L.2
Cosley, D.3
Suri, S.4
Huttenlocher, D.5
Kleinberg, J.6
-
10
-
-
84948149328
-
-
1998, Nov
-
Dai W (1998) B-money proposal, http://www.weidai.com/bmoney.txt, Retrieved 12 Nov 2011
-
(2011)
B-Money Proposal
, vol.12
-
-
Dai, W.1
-
13
-
-
84883120798
-
Bitcoin: An innovative alternative digital currency
-
Grinberg R (2011) Bitcoin: an innovative alternative digital currency. Hastings Sci Tech Law J4:159-208
-
(2011)
Hastings Sci Tech Law J
, vol.4
, pp. 159-208
-
-
Grinberg, R.1
-
16
-
-
84856154188
-
Network analyses of the circulation flow of community currency
-
Kichiji N, Nishibe M (2008) Network analyses of the circulation flow of community currency. Evol Inst Econ Rev 4(2):267-300
-
(2008)
Evol Inst Econ Rev
, vol.4
, Issue.2
, pp. 267-300
-
-
Kichiji, N.1
Nishibe, M.2
-
17
-
-
70349248583
-
Link privacy in social networks
-
ACM, New York
-
Korolova A, Motwani R, Nabar S, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, Napa Valley. ACM, New York, pp 289-298
-
(2008)
Proceedings of the 17Th ACM Conference on Information and Knowledge Management, Napa Valley
, pp. 289-298
-
-
Korolova, A.1
Motwani, R.2
Nabar, S.3
Xu, Y.4
-
18
-
-
52049120331
-
Tastes, ties, and time: A new social network dataset using {f}acebook.Com
-
Lewis K, Kaufman J, Gonzalez M, Wimmer A, Christakis N (2008) Tastes, ties, and time: a new social network dataset using {F}acebook.com. Soc Netw 30:330-342
-
(2008)
Soc Netw
, vol.30
, pp. 330-342
-
-
Lewis, K.1
Kaufman, J.2
Gonzalez, M.3
Wimmer, A.4
Christakis, N.5
-
23
-
-
58449085741
-
Collaborative attack on internet users’ anonymity
-
Puzis R, Yagil D, Elovici Y, Braha D (2009) Collaborative attack on internet users’ anonymity. Internet Res 19(1):60-77
-
(2009)
Internet Res
, vol.19
, Issue.1
, pp. 60-77
-
-
Puzis, R.1
Yagil, D.2
Elovici, Y.3
Braha, D.4
-
25
-
-
0000570212
-
On a class of skew distribution functions
-
Simon H (1955) On a class of skew distribution functions. Biometrika 42:425-440
-
(1955)
Biometrika
, vol.42
, pp. 425-440
-
-
Simon, H.1
-
26
-
-
0036588148
-
Failures and successes: Notes on the development of electronic cash
-
Stalder F (2002) Failures and successes: notes on the development of electronic cash. Inf Soc18(3):209-219
-
(2002)
Inf Soc
, vol.18
, Issue.3
, pp. 209-219
-
-
Stalder, F.1
-
27
-
-
84948138222
-
-
Nov
-
The Economist (2011) Digital currencies - bits and bob, http://www.economist.com/node/18836780, Retrieved 12 Nov 2011
-
(2011)
Digital Currencies - Bits and Bob
, vol.12
-
-
-
30
-
-
12244266337
-
Ppay: Micropayments for peer-to-peer systems
-
Atluri V, Liu P, CCS’03Fairfax. ACM Press, New York
-
Yang B, Garcia-Molin H (2003) PPay: micropayments for peer-to-peer systems. In: Atluri V, Liu P (eds) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS’03), Fairfax. ACM Press, New York, pp 300-310
-
(2003)
Proceedings of the 10Th ACM Conference on Computer and Communication Security
, pp. 300-310
-
-
Yang, B.1
Garcia-Molin, H.2
|