Sciweavers

2492 search results - page 170 / 499
» False-Name-Proofness in Social Networks
Sort
View
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...
WEBDB
2010
Springer
224views Database» more  WEBDB 2010»
14 years 1 months ago
Concurrent One-Way Protocols in Around-the-Clock Social Networks
We introduce and study concurrent One-Way Protocols in social networks. The model is motivated by the rise of online social networks and the fast development of automation feature...
Royi Ronen, Oded Shmueli
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
13 years 9 months ago
On the approximability of influence in social networks
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a soc...
Ning Chen
CCR
2010
169views more  CCR 2010»
13 years 8 months ago
On the leakage of personally identifiable information via online social networks
For purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity ...
Balachander Krishnamurthy, Craig E. Wills
PERCOM
2010
ACM
13 years 6 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling