Separating Private and Business Identities
暂无分享,去创建一个
[1] J. DiMicco,et al. People Sensemaking and Relationship Building on an Enterprise Social Network Site , 2009 .
[2] Ben Laurie,et al. Under)mining Privacy in Social Networks , 2008 .
[3] Frank Stajano,et al. Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.
[4] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Cynthia Dwork,et al. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.
[6] Qi Xie,et al. FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[7] Fabio Vitali,et al. Content cloaking: preserving privacy with Google Docs and other web applications , 2010, SAC '10.
[8] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[9] Dogan Kesdogan,et al. Privacy enhancing identity management: protection against re-identification and profiling , 2005, DIM '05.
[10] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[11] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[12] Andreas Pfitzmann,et al. Usable presentation of secure pseudonyms , 2005, DIM '05.
[13] Oliver Günther,et al. Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback , 2008, ICIS.
[14] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[15] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[16] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[17] Yang Wang,et al. Privacy in Online Social Networking at Workplace , 2009, 2009 International Conference on Computational Science and Engineering.
[18] Róbert Schulcz,et al. Modeling Role-Based Privacy in Social Networking Services , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[21] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[22] Gábor György Gulyás,et al. BlogCrypt: Private Content Publishing on the Web , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.
[23] Balachander Krishnamurthy,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .