Privacy Preserving Intersection of Neighbor Sets Exploiting Cross Checking Capability in a Peer to Peer Social Network Service
暂无分享,去创建一个
[1] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[2] Sonja Buchegger,et al. A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.
[3] Peter Winkler,et al. Comparing information without leaking it , 1996, CACM.
[4] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[5] Elisa Bertino,et al. A Hybrid Approach to Private Record Matching , 2012, IEEE Transactions on Dependable and Secure Computing.
[6] Sanghwan Lee,et al. Efficient bloom filter design for information hiding in peer to peer social networks , 2015, 2015 International Conference on Information Networking (ICOIN).
[7] Bill Fitzgerald. Facebook Tinkers With Users’ Emotions in News Feed Experiment, Stirring Outcry , 2015 .
[8] Divyakant Agrawal,et al. Privacy Preserving Query Processing Using Third Parties , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[9] Iain Parris,et al. Privacy-enhanced social network routing in opportunistic networks , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[10] Yijie Wang,et al. On the feasibility of common-friend measurements for the distributed online social networks , 2012, 7th International Conference on Communications and Networking in China.
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] Refik Molva,et al. Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.
[13] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.