Cachet: a decentralized architecture for privacy preserving social networking with caching
暂无分享,去创建一个
Nikita Borisov | Apu Kapadia | Shirin Nilizadeh | Sonia Jahid | Prateek Mittal | Prateek Mittal | Shirin Nilizadeh | Apu Kapadia | N. Borisov | Sonia Jahid
[1] Ariel J. Feldman,et al. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.
[2] Ping Zhang,et al. On Cooperative Caching in Wireless P2P Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[3] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[4] Markulf Kohlweiss,et al. Scramble! Your Social Network Data , 2011, PETS.
[5] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing Using Social Networks , 2011, ArXiv.
[6] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[7] Giancarlo Ruffo,et al. LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..
[8] Anne-Marie Kermarrec,et al. Gossiping in distributed systems , 2007, OPSR.
[9] Eytan Modiano,et al. Maximizing throughput in wireless networks via gossiping , 2006, SIGMETRICS '06/Performance '06.
[10] Prateek Mittal,et al. DECENT: A decentralized architecture for enforcing privacy in online social networks , 2011, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] Vivien Quéma,et al. FireSpam: Spam Resilient Gossiping in the BAR Model , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.
[12] Nathaniel Husted,et al. Pythia: a privacy aware, peer-to-peer network for social search , 2011, WPES '11.
[13] Honggang Zhang,et al. Design and analysis of a choking strategy for coalitions in data swarming systems , 2012, 2012 Proceedings IEEE INFOCOM.
[14] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[15] Apu Kapadia,et al. Halo: High-Assurance Locate for Distributed Hash Tables , 2008, NDSS.
[16] Emiliano De Cristofaro,et al. Private discovery of common social contacts , 2011, International Journal of Information Security.
[17] Michael Backes,et al. A Security API for Distributed Social Networks , 2011, NDSS.
[18] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[19] M. van Steen,et al. A Gossip-based Distributed News Service for Wireless Mesh Networks , 2006 .
[20] Alexandru Iosup,et al. TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .
[21] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[22] Alberto Montresor,et al. Efficient dissemination in decentralized social networks , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[23] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[24] Refik Molva,et al. Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[25] Prateek Mittal,et al. EASiER: encryption-based access control in social networks with efficient revocation , 2011, ASIACCS '11.
[26] M. van Steen,et al. Canning spam in wireless gossip networks , 2007, 2007 Fourth Annual Conference on Wireless on Demand Network Systems and Services.
[27] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[28] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[29] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[30] Kai Hwang,et al. Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.
[31] Antonio F. Gómez-Skarmeta,et al. Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[32] Mehdi Mani,et al. SCOPE: A prototype for spontaneous P2P social networking , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[33] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[34] Helmut Hlavacs,et al. A socially aware caching mechanism for encounter networks , 2012, Telecommun. Syst..
[35] Rossano Schifanella,et al. Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.
[36] Rajesh Sharma,et al. GoDisco: Selective Gossip Based Dissemination of Information in Social Community Based Overlays , 2011, ICDCN.
[37] Christian Grothoff,et al. Autonomous NAT Traversal , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[38] Johan A. Pouwelse,et al. A Gossip-Based Distributed Social Networking System , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.
[39] Johannes Gehrke,et al. Gossip-based computation of aggregate information , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[40] Yi Lu,et al. Partitioning social networks for time-dependent queries , 2011, SNS '11.
[41] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[42] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[43] George Danezis. Inferring privacy policies for social networking services , 2009, AISec '09.
[44] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[45] Christian Callegari,et al. A Real-Time Algorithm for Skype Traffic Detection and Classification , 2009, NEW2AN.
[46] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[47] Peng Wang,et al. Robust Accounting in Decentralized P2P Storage Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[48] Aleksandar Kuzmanovic,et al. Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.
[49] Anne-Marie Kermarrec,et al. The Gossple Anonymous Social Network , 2010, Middleware.
[50] Claudio Soriente,et al. Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.
[51] Li Xiao,et al. Distributed caching and adaptive search in multilayer P2P networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[52] Zhiyong Xu,et al. SBARC: A supernode based peer-to-peer file sharing system , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[53] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[54] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[55] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[56] Krishna P. Gummadi,et al. Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.
[57] Sem C. Borst,et al. Distributed Caching Algorithms for Content Distribution Networks , 2010, 2010 Proceedings IEEE INFOCOM.