Enabling Interoperable and Selective Data Sharing among Social Networking Sites
暂无分享,去创建一个
[1] Michael T. Goodrich,et al. Persistent Authenticated Dictionaries and Their Applications , 2001, ISC.
[2] Jan Camenisch,et al. Design and implementation of the idemix anonymous credential system , 2002, CCS '02.
[3] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[4] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[5] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[6] Hugo Liu. InterestMap : Harvesting Social Network Profiles for Recommendations , 2004 .
[7] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[8] Michael T. Goodrich,et al. Implementation of an authenticated dictionary with skip lists and commutative hashing , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[9] Carl Pomerance,et al. Advances in Cryptology — CRYPTO ’87 , 2000, Lecture Notes in Computer Science.
[10] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[11] Dongwan Shin,et al. Controlled sharing of identity attributes for better privacy , 2007, 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007).
[12] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .