[go: up one dir, main page]

Frikken et al., 2006 - Google Patents

Private social network analysis: How to assemble pieces of a graph privately

Frikken et al., 2006

View PDF
Document ID
18338776669401442320
Author
Frikken K
Golle P
Publication year
Publication venue
Proceedings of the 5th ACM workshop on Privacy in electronic society

External Links

Snippet

Connections in distributed systems, such as social networks, online communities or peer-to- peer networks, form complex graphs. These graphs are of interest to scientists in fields as varied as marketing, epidemiology and psychology. However, knowledge of the graph is …
Continue reading at crypto.stanford.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • H04L67/1042Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
    • H04L67/1044Group management mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Frikken et al. Private social network analysis: How to assemble pieces of a graph privately
Huang et al. Blockchain-based multiple groups data sharing with anonymity and traceability
CN111064734B (en) An anonymous and traceable method for user identity in a blockchain system, and a corresponding storage medium and electronic device
Xie et al. Blockchain‐based cloud data integrity verification scheme with high efficiency
Kolesnikov Truly efficient string oblivious transfer using resettable tamper-proof tokens
Ghesmati et al. Sok: How private is bitcoin? classification and evaluation of bitcoin privacy techniques
Li et al. Private matching
Chen et al. Blockchain/abe-based fusion solution for e-government data sharing and privacy protection
Talviste Applying secure multi-party computation in practice
Yao et al. Private information: To reveal or not to reveal
Fathi et al. Anon-ISAC: Anonymity-preserving cyber threat information sharing platform based on permissioned Blockchain
Baldwin et al. Cryptographic protocol for trustable match making
Yao et al. Point-based trust: Define how much privacy is worth
Dou et al. Efficient private subset computation
Zhang et al. Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Zand et al. Efficient cyber-evidence sharing using zero-knowledge proofs
Teng et al. Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions
Tian et al. Unlinkable and revocable secret handshake
Fetzer et al. Universally composable auditable surveillance
Gong Advancements in public-key cryptography: crafting novel constructions to address emerging demands
Ye et al. An anonymous broadcasting system with accountability based on group signatures
di Vimercati et al. New directions in access control
Lueks Security and Privacy via Cryptography Having your cake and eating it too
Adjei et al. Anonymous signcryption for securing knowledge management system
Li et al. Privacy‐Preserving Graph Operations for Mobile Authentication