-
2
-
-
35348848696
-
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
-
(2007)
WWW
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
5
-
-
84887074866
-
Drac: an architecture for anonymous low-volume communications
-
G. Danezis, C. Diaz, C. Troncoso, and B. Laurie. Drac: an architecture for anonymous low-volume communications. In PETS, 2010.
-
(2010)
PETS
-
-
Danezis, G.1
Diaz, C.2
Troncoso, C.3
Laurie, B.4
-
6
-
-
85180633166
-
Sybilinfer: Detecting Sybil nodes using social networks
-
G. Danezis and P. Mittal. Sybilinfer: Detecting Sybil nodes using social networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
8
-
-
4544304744
-
The Sybil Attack
-
J. Douceur. The Sybil Attack. In IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
9
-
-
67650655439
-
Differential privacy: a survey of results
-
C. Dwork. Differential privacy: a survey of results. In TAMC, 2008.
-
(2008)
TAMC
-
-
Dwork, C.1
-
10
-
-
77956890234
-
Monte carlo sampling methods using markov chains and their applications
-
W. K. Hastings. Monte carlo sampling methods using markov chains and their applications. Biometrika, 57(1), 1970.
-
(1970)
Biometrika
, vol.57
, Issue.1
-
-
Hastings, W. K.1
-
11
-
-
84859194833
-
Resisting structural re-identification in anonymized social networks
-
M. Hay, G. Miklau, D. Jensen, D. Towsley, and P. Weis. Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow., 1(1), 2008.
-
(2008)
Proc. VLDB Endow
, vol.1
, Issue.1
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Towsley, D.4
Weis, P.5
-
12
-
-
41849128290
-
-
Technical Report 07-09, University of Massachusetts, Amherst
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-09, University of Massachusetts, Amherst, 2007.
-
(2007)
Anonymizing social networks
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
14
-
-
84863903676
-
Whanaungatanga: A Sybil-proof distributed hash table
-
C. Lesniewski-Laas and M. F. Kaashoek. Whanaungatanga: A Sybil-proof distributed hash table. In NSDI, 2010.
-
(2010)
NSDI
-
-
Lesniewski-Laas, C.1
Kaashoek, M. F.2
-
15
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Liu, K.1
Terzi, E.2
-
16
-
-
85045322914
-
Fast identity anonymization on graphs
-
X. Lu, Y. Song, and S. Bressan. Fast identity anonymization on graphs. In DEXA, 2012.
-
(2012)
DEXA
-
-
Lu, X.1
Song, Y.2
Bressan, S.3
-
18
-
-
5744249209
-
Equation of state calculations by fast computing machines
-
N. Metropolis, A. W. Rosenbluth, M. N. Rosenbluth, A. H. Teller, and E. Teller. Equation of state calculations by fast computing machines. The Journal of Chemical Physics, 21(6), 1953.
-
(1953)
The Journal of Chemical Physics
, vol.21
, Issue.6
-
-
Metropolis, N.1
Rosenbluth, A. W.2
Rosenbluth, M. N.3
Teller, A. H.4
Teller, E.5
-
21
-
-
85180747396
-
X-vine: Secure and pseudonymous routing using social networks
-
P. Mittal, M. Caesar, and N. Borisov. X-vine: Secure and pseudonymous routing using social networks. In NDSS, 2012.
-
(2012)
NDSS
-
-
Mittal, P.1
Caesar, M.2
Borisov, N.3
-
22
-
-
85026514688
-
Pisces: Anonymous communication using social networks
-
P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. In NDSS, 2013.
-
(2013)
NDSS
-
-
Mittal, P.1
Wright, M.2
Borisov, N.3
-
23
-
-
79960871268
-
Keep your friends close: Incorporating trust into social network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim. Keep your friends close: Incorporating trust into social network-based sybil defenses. In INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
24
-
-
78650907130
-
Measuring the mixing time of social graphs
-
A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, 2010.
-
(2010)
IMC
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
25
-
-
84877951088
-
Anonymity in the wild: mixes on unstructured networks
-
S. Nagaraja. Anonymity in the wild: mixes on unstructured networks. In PETS, 2007.
-
(2007)
PETS
-
-
Nagaraja, S.1
-
27
-
-
57249110719
-
Tribler: a social-based peer-to-peer system: Research articles
-
J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. Tribler: a social-based peer-to-peer system: Research articles. Concurr. Comput. : Pract. Exper., 20(2), 2008.
-
(2008)
Concurr. Comput. : Pract. Exper
, vol.20
, Issue.2
-
-
Pouwelse, J. A.1
Garbacki, P.2
Wang, J.3
Bakker, A.4
Yang, J.5
Iosup, A.6
Epema, D. H. J.7
Reinders, M.8
van Steen, M. R.9
Sips, H. J.10
-
28
-
-
70350635777
-
Relationship privacy: output perturbation for queries with joins
-
V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, 2009.
-
(2009)
PODS
-
-
Rastogi, V.1
Hay, M.2
Miklau, G.3
Suciu, D.4
-
29
-
-
82955196835
-
Sharing graphs using differentially private graph models
-
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao. Sharing graphs using differentially private graph models. In IMC, 2011.
-
(2011)
IMC
-
-
Sala, A.1
Zhao, X.2
Wilson, C.3
Zheng, H.4
Zhao, B. Y.5
-
34
-
-
57149134039
-
Randomizing social networks: a spectrum preserving approach
-
X. Ying and X. Wu. Randomizing social networks: a spectrum preserving approach. In SDM, 2008.
-
(2008)
SDM
-
-
Ying, X.1
Wu, X.2
-
35
-
-
70449694823
-
Sybillimit: A near-optimal social network defense against Sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against Sybil attacks. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Yu, H.1
Gibbons, P. B.2
Kaminsky, M.3
Xiao, F.4
-
36
-
-
35548992569
-
SybilGuard: Defending against Sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: Defending against Sybil attacks via social networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
-
37
-
-
67650219221
-
Preserving the privacy of sensitive relationships in graph data
-
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, 2008.
-
(2008)
PinKDD
-
-
Zheleva, E.1
Getoor, L.2
-
38
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.
-
(2008)
ICDE
-
-
Zhou, B.1
Pei, J.2
-
39
-
-
79959532187
-
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks
-
B. Zhou and J. Pei. The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks. Knowl. Inf. Syst., 28(1), 2011.
-
(2011)
Knowl. Inf. Syst
, vol.28
, Issue.1
-
-
Zhou, B.1
Pei, J.2
|