Sciweavers

74 search results - page 5 / 15
» k-symmetry model for identity anonymization in social networ...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
KDD
2008
ACM
202views Data Mining» more  KDD 2008»
14 years 9 months ago
Data and Structural k-Anonymity in Social Networks
The advent of social network sites in the last years seems to be a trend that will likely continue. What naive technology users may not realize is that the information they provide...
Alina Campan, Traian Marius Truta
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
14 years 2 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
CONEXT
2009
ACM
13 years 9 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
CMS
2006
158views Communications» more  CMS 2006»
13 years 10 months ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...