Related Articles
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5452715&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5452715
http://www.cs.virginia.edu/felt/privacybyproxy.pdf
http://dx.doi.org/10.1109/ICDE.2009.158
http://dl.acm.org/citation.cfm?id=1921080
http://www.academia.edu/1229052/Social_Privacy_Protector_-
_Protecting_Users_Privacy_in_Social_Networks
http://www.eurecom.fr/en/publication/2908/download/rs-publi-2908.pdf
http://www.cnn.com/2012/08/02/tech/social-media/facebook-fake-accounts
http://docs.lib.purdue.edu/cgi/viewcontent.cgi?article=1143&context=ccpubs
www.elon.edu/docs/e-web/academics/.../05SpinelliEJFall10.pdf
arxiv.org/pdf/1105.4254
www.cse.hut.fi/en/publications/B/11/papers/li.pdf
w2spconf.com/2011/papers/privacyVsProtection.pdf
www.cs.utexas.edu/~shmat/shmat_oak09.pdf
www.p2p.tu-darmstadt.de/fileadmin/user_upload/.../safebook.pdf
Posted By:
Unknown
On 12:50 AM
In
Subscribe to:
Comments (Atom)
0 comments:
Post a Comment