SOUP: an online social network by the people, for the people
暂无分享,去创建一个
[1] Sonja Buchegger,et al. Encryption for Peer-to-Peer Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[2] Ramón Cáceres,et al. Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).
[3] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[4] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[5] Ramón Cáceres,et al. Confidant: Protecting OSN Data without Locking It Up , 2011, Middleware.
[6] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[7] László Gyarmati,et al. Measuring user behavior in online social networks , 2010, IEEE Network.
[8] Rajesh Sharma,et al. SuperNova: Super-peers based architecture for decentralized online social networks , 2011, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[9] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[10] Anja Feldmann,et al. Understanding online social network usage from a network perspective , 2009, IMC '09.
[11] Krzysztof Rzadca,et al. Replica Placement in P2P Storage: Complexity and Game Theoretic Analyses , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[12] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[13] Ben Y. Zhao,et al. Understanding latent interactions in online social networks , 2010, IMC '10.
[14] Krishna P. Gummadi,et al. Measurement and analysis of online social networks , 2007, IMC '07.
[15] Catherine Dwyer. Privacy in the Age of Google and Facebook , 2011, IEEE Technology and Society Magazine.
[16] Valerio Schiavoni,et al. Exploiting Node Connection Regularity for DHT Replication , 2011, 2011 IEEE 30th International Symposium on Reliable Distributed Systems.
[17] Virgílio A. F. Almeida,et al. Characterizing user behavior in online social networks , 2009, IMC '09.
[18] Nikita Borisov,et al. Cachet: a decentralized architecture for privacy preserving social networking with caching , 2012, CoNEXT '12.
[19] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[20] Alexandros G. Dimakis,et al. Network Coding for Distributed Storage Systems , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[21] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[22] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[23] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[24] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM '10.
[25] Stefan Katzenbeisser,et al. ProofBook: An Online Social Network Based on Proof-of-Work and Friend-Propagation , 2014, SOFSEM.
[26] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[27] Shivakant Mishra,et al. Results from a Practical Deployment of the MyZone Decentralized P2P Social Network , 2013, ArXiv.
[28] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[29] Jun Li,et al. On the state of OSN-based Sybil defenses , 2014, 2014 IFIP Networking Conference.
[30] Erwan Le Merrer,et al. Choosing partners based on availability in P2P networks , 2012, TAAS.
[31] Shaojie Tang,et al. Relationship classification in large scale online social networks and its impact on information propagation , 2011, 2011 Proceedings IEEE INFOCOM.