Related Articles



http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5452715&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5452715

http://www.cs.virginia.edu/felt/privacybyproxy.pdf

http://dx.doi.org/10.1109/ICDE.2009.158

http://dl.acm.org/citation.cfm?id=1921080

http://www.academia.edu/1229052/Social_Privacy_Protector_-
_Protecting_Users_Privacy_in_Social_Networks

http://www.eurecom.fr/en/publication/2908/download/rs-publi-2908.pdf

http://www.cnn.com/2012/08/02/tech/social-media/facebook-fake-accounts

http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1143&context=ccpubs

www.elon.edu/docs/e-web/academics/.../05SpinelliEJFall10.pdf

arxiv.org/pdf/1105.4254

www.cse.hut.fi/en/publications/B/11/papers/li.pdf

w2spconf.com/2011/papers/privacyVsProtection.pdf

www.cs.utexas.edu/~shmat/shmat_oak09.pdf‎

www.p2p.tu-darmstadt.de/fileadmin/user_upload/.../safebook.pdf








0 comments:

Post a Comment