Frikken et al., 2006 - Google Patents
Private social network analysis: How to assemble pieces of a graph privatelyFrikken et al., 2006
View PDF- Document ID
- 18338776669401442320
- Author
- Frikken K
- Golle P
- Publication year
- Publication venue
- Proceedings of the 5th ACM workshop on Privacy in electronic society
External Links
Snippet
Connections in distributed systems, such as social networks, online communities or peer-to- peer networks, form complex graphs. These graphs are of interest to scientists in fields as varied as marketing, epidemiology and psychology. However, knowledge of the graph is …
- 238000003012 network analysis 0 title description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Frikken et al. | Private social network analysis: How to assemble pieces of a graph privately | |
Huang et al. | Blockchain-based multiple groups data sharing with anonymity and traceability | |
CN111064734B (en) | An anonymous and traceable method for user identity in a blockchain system, and a corresponding storage medium and electronic device | |
Xie et al. | Blockchain‐based cloud data integrity verification scheme with high efficiency | |
Kolesnikov | Truly efficient string oblivious transfer using resettable tamper-proof tokens | |
Ghesmati et al. | Sok: How private is bitcoin? classification and evaluation of bitcoin privacy techniques | |
Li et al. | Private matching | |
Chen et al. | Blockchain/abe-based fusion solution for e-government data sharing and privacy protection | |
Talviste | Applying secure multi-party computation in practice | |
Yao et al. | Private information: To reveal or not to reveal | |
Fathi et al. | Anon-ISAC: Anonymity-preserving cyber threat information sharing platform based on permissioned Blockchain | |
Baldwin et al. | Cryptographic protocol for trustable match making | |
Yao et al. | Point-based trust: Define how much privacy is worth | |
Dou et al. | Efficient private subset computation | |
Zhang et al. | Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services | |
Zand et al. | Efficient cyber-evidence sharing using zero-knowledge proofs | |
Teng et al. | Optimizing signature space performance in privacy-enhanced blockchains: novel ring signature solutions | |
Tian et al. | Unlinkable and revocable secret handshake | |
Fetzer et al. | Universally composable auditable surveillance | |
Gong | Advancements in public-key cryptography: crafting novel constructions to address emerging demands | |
Ye et al. | An anonymous broadcasting system with accountability based on group signatures | |
di Vimercati et al. | New directions in access control | |
Lueks | Security and Privacy via Cryptography Having your cake and eating it too | |
Adjei et al. | Anonymous signcryption for securing knowledge management system | |
Li et al. | Privacy‐Preserving Graph Operations for Mobile Authentication |