A Randomized Approach for Structural and Message Based Private Friend Recommendation in Online Social Networks

[1]  A. Shriram,et al.  Privacy Preserving Data Mining , 2015, Advances in Information Security.

[2]  Ariel J. Feldman,et al.  Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.

[3]  Claudio Soriente,et al.  Hummingbird: Privacy at the Time of Twitter , 2012, 2012 IEEE Symposium on Security and Privacy.

[4]  Peng Liu,et al.  Stalking online: on user privacy in social networks , 2012, CODASPY '12.

[5]  Refik Molva,et al.  Analysis of Privacy in Online Social Networks from the Graph Theory Perspective , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[6]  Jun Guo,et al.  SFViz: interest-based friends exploration and recommendation in social networks , 2011, VINCI '11.

[7]  Bi-Ru Dai,et al.  A Framework of Recommendation System Based on Both Network Structure and Messages , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[8]  Jun Hu,et al.  Security Issues in Online Social Networks , 2011, IEEE Internet Computing.

[9]  Sushil J. Louis,et al.  Friend recommendations in social networks using genetic algorithms and network topology , 2011, 2011 IEEE Congress of Evolutionary Computation (CEC).

[10]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[11]  Aristides Gionis,et al.  Social Network Analysis and Mining for Business Applications , 2011, TIST.

[12]  Ashwin Machanavajjhala,et al.  Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..

[13]  Xing Xie,et al.  Potential Friend Recommendation in Online Social Network , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[14]  Jaime Delgado,et al.  User's privacy in applications provided through social networks , 2010, WSM@MM.

[15]  George D. C. Cavalcanti,et al.  A graph-based friend recommendation system using Genetic Algorithm , 2010, IEEE Congress on Evolutionary Computation.

[16]  Yuguang Fang,et al.  A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation , 2010, 2010 Proceedings IEEE INFOCOM.

[17]  B. Krishnamurthy,et al.  On the leakage of personally identifiable information via online social networks , 2010, WOSN '09.

[18]  Frederic P. Miller,et al.  Advanced Encryption Standard , 2009 .

[19]  Alec Wolman,et al.  Lockr: better privacy for social networks , 2009, CoNEXT '09.

[20]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[21]  Michael J. Muller,et al.  Make new friends, but keep the old: recommending people on social networking sites , 2009, CHI.

[22]  J. Srivastava,et al.  Data mining for social network analysis , 2008, ISI.

[23]  Michael R. Clarkson,et al.  Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[24]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[25]  Caroline Fontaine,et al.  A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..

[26]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[27]  Shuchuan Lo,et al.  WMR--A Graph-Based Algorithm for Friend Recommendation , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06).

[28]  Ravi Kumar,et al.  Structure and evolution of online social networks , 2006, KDD '06.

[29]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[30]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[31]  Edith Cohen,et al.  Optimal oblivious routing in polynomial time , 2003, STOC '03.

[32]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[33]  S. Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[34]  Andrew Chi-Chih Yao,et al.  How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).

[35]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[36]  Hamza Ahmed,et al.  Data Mining Based Social Network Analysis from Online Behaviour , 2015 .

[37]  Oded Goldreich,et al.  Foundations of Cryptography: General Cryptographic Protocols , 2004 .

[38]  S. Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994 .

[39]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[40]  Jane G. Bensahel,et al.  You Can Buy Research Dollars for Pennies , 1975, IEEE Engineering Management Review.

[41]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .