Persona
- 16 August 2009
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- Vol. 39 (4), 135-146
- https://doi.org/10.1145/1592568.1592585
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Secure Threshold Multi Authority Attribute Based Encryption without a Central AuthorityLecture Notes in Computer Science, 2008
- Involuntary Information Leakage in Social Network ServicesLecture Notes in Computer Science, 2008
- PanoramaPublished by Association for Computing Machinery (ACM) ,2007
- Measurement and analysis of online social networksPublished by Association for Computing Machinery (ACM) ,2007
- Challenges in mining social network dataPublished by Association for Computing Machinery (ACM) ,2007
- Inferring Privacy Information from Social NetworksLecture Notes in Computer Science, 2006
- Imagined Communities: Awareness, Information Sharing, and Privacy on the FacebookLecture Notes in Computer Science, 2006
- Fuzzy Identity-Based EncryptionLecture Notes in Computer Science, 2005
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Secure group communications using key graphsACM SIGCOMM Computer Communication Review, 1998