1 |
A. M. Al-senaidy, T. Ahmnad, and M. M. Shafi, "Privacy and security concerns in SNS: a Saudi Arabian users point of view," Int. J. Comput. Applicat., vol. 49, no. 14, pp. 1-5, July 2012.
|
2 |
D. M. Boyd and N. B. Ellison, "Social network sites: definition, history, and scholarship," J. Comput.-Mediated Commun., vol. 13, no. 1, article no. 11, Oct. 2007.
|
3 |
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social Phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, Oct. 2007.
|
4 |
D. H. Jeon, J. Y. Chun, and l. R. Jeong, "An efficient privacy-preserving data sharing scheme in social network," J. Korea Inst. Inform. Soc. Cryptology, vol. 22, no. 3, pp. 447-461, July 2012.
과학기술학회마을
|
5 |
S. Guha, K. Tang, and P. Francis, "NOYB: privacy in online social networks," in Proc. 1st Workshop on Online Social Networks(WOSN 2008), pp. 49-54, Seattle, U.S.A., Aug. 2008.
|
6 |
D. Boyd, "Facebook's privacy trainwreck: exposure, invasion, and social," Int. J. Research into New Media Technol., vol. 14, no. 1, pp. 13-20, Jan. 2008.
DOI
|
7 |
M. M. Lucas, and N. Borisov, "flyByNight: mitigating the privacy risks of social networking," in Proc. 7th ACM Workshop on Privacy in the Electronic Soc. (WPES), pp. 1 -8, Alexandria, U.S.A., Oct. 2008.
|
8 |
L. A. Cutillo and R. Molva, "Safebook: a privacy-preserving online social network leveraging on real-life trust," IEEE Commun. Mag., vol. 47, no. 12, pp. 94-101, Dec. 2009.
|
9 |
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 1, pp. 612-613, Nov. 1979.
DOI
ScienceOn
|
10 |
C. H. Lee, Y. M. Jung, J. W. Jung, and D. H. Won, "Dynamic user reliability evaluation scheme for social network service," J. Korea Inst. Inform. Soc. Cryptology, vol. 23, no. 2, pp. 157-168, Apr. 2013.
DOI
ScienceOn
|
11 |
H. C. Cho, Y. S. Han, and L. H. Kim, "Evaluating the user reputation through social network on UCC video services," Human Comput. Interaction(HCI), pp. 273-277, Feb. 2009
|