Privacy Preserving Intersection of Neighbor Sets Exploiting Cross Checking Capability in a Peer to Peer Social Network Service
暂无分享,去创建一个
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Sanghwan Lee,et al. Efficient bloom filter design for information hiding in peer to peer social networks , 2015, 2015 International Conference on Information Networking (ICOIN).
[3] Yijie Wang,et al. On the feasibility of common-friend measurements for the distributed online social networks , 2012, 7th International Conference on Communications and Networking in China.
[4] Sonja Buchegger,et al. A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[5] Elisa Bertino,et al. A Hybrid Approach to Private Record Matching , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[7] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[8] Bill Fitzgerald. Facebook Tinkers With Users’ Emotions in News Feed Experiment, Stirring Outcry , 2015 .
[9] Divyakant Agrawal,et al. Privacy Preserving Query Processing Using Third Parties , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[10] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[11] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[12] Ellis Horowitz,et al. Fundamentals of data structures in C , 1976 .
[13] Iain Parris,et al. Privacy-enhanced social network routing in opportunistic networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[14] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.