An investigation into the requirements of privacy in social networks and factors contributing to users’ concerns about violation of their privacy

  • Razieh Malekhosseini
  • Mehdi Hosseinzadeh
  • Keyvan Navi
Review Article
  • 13 Downloads

Abstract

Social networks are specific types of social media which consolidate the ability of omnipresent connection for users and devices to share user-centric data objects among interested users. Taking advantage of the characteristics of both mobile social networks (MSNs) and online social networks (OSNs), MSNs are capable of providing an efficient and effective mobile environment for users to access, distribute, and share data. OSNs provide capability of search, data sharing, and online social interactions for users through Internet sites. However, the lack of a protective infrastructure in these networks has turned them into convenient targets for various risks. This is the main purpose why social networks including MSNs and OSNs carry disparate and intricate safety concerns specially privacy-preserving challenges and what has been done to improve these challenges. In addition, what types of data should be protected and what are the different architectures provided for each of these networks? In this paper, we aim to provide a clear categorization on privacy challenges and a deep exploration over some recent solutions in MSNs and OSNs. In particular, in MSNs, proposed scheme to protect data types is categorized, and in OSNs, all types of proposed architectures, along with the proposed mechanisms for privacy, are classified. To conclude, several major open research issues are discussed, and future research directions are outlined.

Keywords

Social networks Mobile social networks (MSNs) Online social networks (OSNs) Privacy challenges Privacy violation 

References

  1. Abbas F, Rajput U, Wan J, Eun H, Oh H (2016) Say Hello Again: Privacy Preserving Matchmaking Using Cloud in Encounter Based Mobile Social Networks. In: Proceeding in: 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid ComputingGoogle Scholar
  2. Acquisti A, Gross R (2006) Imagined communities: Awareness, information sharing, and privacy on the Facebook. In: 6th Workshop on Privacy Enhancing Technologies, pp 36–58Google Scholar
  3. Afifty Y (2008) Access control in a peer-to-peer social network. Master Thesis, EPFL, Lausanne, SwitzerlandGoogle Scholar
  4. Aiello ML, Ruffo G (2012) LotusNet:Tunable privacy for distributed online social network services. Elsevier J Comput Commun 35(1):75–88CrossRefGoogle Scholar
  5. Ardagna CA, Jajodia S, Samarati P, Stavrou A (2013) Providing users’ anonymity in mobile hybrid networks. ACM Trans Internet Technol 12(3):1–33CrossRefGoogle Scholar
  6. Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user defined privacy, and scholarship. In: proceeding of ACM Conference on Special Interest Group On Data Communications (ACM SIGCOMM), pp 135–146Google Scholar
  7. Barnes J (1954) Class and Committees in a Norwegian Island Parish. Human RelationsGoogle Scholar
  8. Beach A, Gartrell M, Han R (2009) Solutions to security and privacy issues in mobile social networking. In: Proc. Int. Conf. CSE, pp 1036–1042Google Scholar
  9. Besmer A, Lipford H (2009) Tagged photos: concerns, perceptions, and protections. In: Proceedings of CHI2009 extended abstract, pp 4585–4590Google Scholar
  10. Blum M (1983) How to exchange (secret) keys. ACM Trans Comput Syst 1(2):175–193CrossRefGoogle Scholar
  11. Boyd D, Ellison N (2007) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13(1): 210–230CrossRefGoogle Scholar
  12. Boyd D, Hargittai E (2010) Facebook privacy settings: who cares? First Mond 15(8):479–500Google Scholar
  13. Buchegger S, Datta A (2009) A case for P2P infrastructure for social networks- opportunities & challengers. In: Proceeding of the 6th International Conference on Wireless On-Demand Network Systems and Services (WONS), pp 161–168Google Scholar
  14. Buchegger S, Vu Lh, Datta A (2009) PeerSoN: P2P Social Networking Early Experiences and Insights. In: Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, pp 46–52Google Scholar
  15. Challal Y (2005) Group key management protocols: a novel taxonomy. Int J Inf Theory 2(2):105–118MathSciNetGoogle Scholar
  16. Chang W, Wu J, Tan C (2011) Friendship-based location privacy in mobile social networks. Int J Secur Netw 6(4):226–236CrossRefGoogle Scholar
  17. Chao S, Dongyu A (2013) Survey of location privacy. http://students.csci.unt.edu/da0097/
  18. Chellappa RK, Sin R (2005) Personalization versus privacy: an empirical examination of the online consumer’s dilemma. Inf Technol Manag 6(2):181–202CrossRefGoogle Scholar
  19. Cheng W, Aritsugi M (2014) A user sensitive privacy-preserving location sharing system in mobile social networks. Proc Proc Comput Sci 35:1692–1701CrossRefGoogle Scholar
  20. Chin A, Zhang D (eds) (2013) Mobile social networking an innovative approach. In: computational social sciences. Springer, New York, pp 112–113Google Scholar
  21. Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104–115CrossRefGoogle Scholar
  22. Cutillo LA, Molva R, Strufe T (2009) Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. In: Proc. IEEE Int. Symp. a World of Wireless, Mobile and Multimedia Networks and Workshops (WoWMoM), Kos, Greece, pp 94–101Google Scholar
  23. da Silva PM, Dias J (2017) Manuel RicardoMistrustful P2P: deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks. Comput Netw.  https://doi.org/10.1016/j.comnet.2017.04.005 Google Scholar
  24. De Cristofaro E, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: proceeding of IEEE Symposium on Security and Privacy, pp 285–299Google Scholar
  25. De Capitani di vimercati S, Foresti S, Livraga G, Samarati P (2012) Data privacy: definitions and techniques. Int J Uncertain Fuzziness Knowl Based Syst 20(06): 793–817CrossRefMATHGoogle Scholar
  26. De Montjoye YA, Hildalgo CA, Verleysen M, Blondel VD (2013) unique in the crowed: the privacy bounds of human mobility. Sci Rep.  https://doi.org/10.1038/srep01376 Google Scholar
  27. DefrawyKEl,SolisJ, Tsudik G,“Leveraging social contacts for message confidentiality in delay tolerant networks. In: Proc. IEEECOMPSAC, 2009, pp. 271–279Google Scholar
  28. Dinev T, Hart P (2004) Privacy concerns and Internet use—a model of trade-off factors. In: Paper read at Working Paper, Department of Information Technology and Operations Management at Florida Atlantic UniversityGoogle Scholar
  29. Ding X, Zhang L, Wan Zh, Gu M (2010) A brief survey on deanonmyzation attacks in online social networks: proceeding of International Conference on Computational Aspects Of Social Networks (CASoN), China 611–615Google Scholar
  30. Dóra L, Holczer T (2010) Hide-and-Lie: Enhancing application-level privacy in opportunistic networks. In: Proc. MobiOpp, pp 135–142Google Scholar
  31. Dramitinos M, Vannier R, Lassous IG 2009 A performance evaluation framework for fair solutions in ad hoc networks. In: Proc. ACM MSWiM, 2009, pp 46–53Google Scholar
  32. Duckham M, Kulik L (2005) A formal model of obfuscation and negotiation for location privacy. In: Proc. Pervasive, pp 152–170Google Scholar
  33. Dwyer C, Hiltz SR, Passerini K (2007).Trust and privacy concern within social networking sites: a comparison of Facebook and MySpace. In: Paper read at the Thirteenth Americas Conference on Information Systems, at Keystone, ColoradoGoogle Scholar
  34. Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “Friends”: social capital and college students’ use of online social network sites. J Comput Mediat Commun 12(4):1143–1168CrossRefGoogle Scholar
  35. European Commission (2012a) The Directive of the European Parliament and of the Council of 24 October 1995 review 2012 MEMO/12/41. http://europa.eu/rapid/press-releaseMEMO-12-41en.pdf
  36. European Commission (2012b) The Directive of the European Parliament and of the Council of 24 October 1995 review 2012 Regulation Council of the European Parliament. document/review2012/com. http://ec.europa.eu/justice/data-protection/2012_11_en.pdf
  37. European Council (1995) Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of Individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities, 23 November 1995, L 281/31, Available at. http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/dir1995-46_part1_en.pdf
  38. Facebook Privacy Policy (2017) Facebook Privacy Policy (2017). April 2017 Available at http://facebook.com/policy.php. Accessed Apr 2017
  39. Facebook statement of right and responsibilities (2017) acebook statement of right and responsibilities (2017) April 2017. Available athttp://facebook.com/terms.php. Accessed Apr 2017
  40. Feng B, Deng RH, Wenbo M (1998) Efficient and practical fair exchange protocols with off-line TTP. In: Proc. IEEE Symp. Security Privacy, pp 77–85Google Scholar
  41. Fogel J, Nehmad E (2009) Internet social network communities: Risk taking, trust, and privacy concerns. Comput Hum Behav 25(1):160–153CrossRefGoogle Scholar
  42. Fu Y, Wang Y, Peng W (2014) Common Finder: a decentralized and privacy-preserving common-friend measurement method for the distributed online social networks. Comput Netw 64:369–389.  https://doi.org/10.1016/j.comnet.2014.02.020 CrossRefGoogle Scholar
  43. Gedik B, Ling L (2008) Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans Mobile Comput 7(1):1–18CrossRefGoogle Scholar
  44. Gilbert E, Karahalios K, Sandvig C (2008) The network in the garden: an empirical analysis of social media in rural life. In: Proceeding of CHI2008, pp 1603–1612Google Scholar
  45. Goldie KR (2010) Aliases, creeping, and wall cleaning: understanding privacy in the age of Facebook. First Mond 15(1):1–4MathSciNetGoogle Scholar
  46. Gongjun Y, Olariu S, Weigle MC (2009) Providing location security in vehicular ad hoc networks. IEEE Wireless Commun 16(6):48–55CrossRefGoogle Scholar
  47. Google pluse (2017) Google pluse Pages Additional Terms of Service (2017). April 2017 Available at https://www.google.com/intl/en/+/policy/pagesterm.html. Accessed Apr 2017
  48. Google Privacy Policy (2017) https://www.google.com/intl/en/+/policies/privacy/. Accessed Apr 2017
  49. Graf K, Gross Ch, Stingl D, Hartung D, Kovacevic A, Steinmetz R (2011) Life Social. KOM: a Secure and P2P-based solution for online social networks. In: Proceeding of the IEEE Consumer Communications and Networking Conference (CCNC), pp 554–558Google Scholar
  50. Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Paper read at the 2005 ACM Workshop on Privacy in the Electronic SocietyGoogle Scholar
  51. Gruteser M, Grunwald D (2003) Anonymous usage of location-based services through spatial and temporal cloaking. International Conference on Mobile Systems, Applications, and Services. 31–42Google Scholar
  52. Guha S, Tang K, Francis PP (2008) NOYB: privacy in online social networks. In: First Workshop on Online Social Networks (WOSP’08), pp 210–230Google Scholar
  53. Ho E, Lasch S, podolsky A, The Next Digital Divide: online Social Network Privacy. Center for study commercial Activities Research Report, 2008Google Scholar
  54. Hui K-L, Teo HH, Lee S-YT (2007) The value of privacy assurance: an exploratory field experiment. Manag Inf Syst Q 31(1):19–33CrossRefGoogle Scholar
  55. Jahid S, Mittal P, Borisov N (2011) EASiER: encryption-based access control in social networks with efficient revocation. In: Proceeding of the 6th ACM Symposium on Information, Computer and Communications Security, China, 411–415Google Scholar
  56. Jahid S, Nilizadeh Sh, Mittal P, Borisov N, Kapadia A (2012) DECENT: a decentralized architecture for enforcing privacy in online social networks. In: Proceeding of the 4th IEEE International Workshop on Security and Social Networking, (SESOC’12),326–332Google Scholar
  57. Joinson AN (2008)Looking at, looking up or keeping up with people?: motives and use of Facebook. In: Proceeding of CHI 2008, pp 1027–1036Google Scholar
  58. Kaufman J, Christakis N, Lewis K (2008) The taste for privacy: An analysis of college student privacy settings in an online social network. J Comput Mediat Commun 14(1):79–100CrossRefGoogle Scholar
  59. Kayastha N, Niyato D, Wang P, Hossain E (2011) Applications, architectures, and protocol design issues for mobile social networks: a survey. In: Proc. IEEE, 99(12) 2130–2158Google Scholar
  60. Krishnamurithy B, Wills EC (2008) Characterectizing Privacy in Social Networks. In: Proceedings of the First Workshop on Online Social Networks, pp 37–42Google Scholar
  61. Lampe C, Ellison NB, Steinfield C (2008) Changes in use and perception of Facebook. In: Proceedings of SCW2008, 721–730Google Scholar
  62. Lehikoinen JT, Olsson T, Toivola H (2008). Privacy regulation in online social interaction. In: Paper read at ICT, Society and Human Beings 2008Google Scholar
  63. Li M, Ning C, Shucheng Y, Wenjing L (2011) FindU: privacy-preserving personal profile matching in mobile social networks. In: Proc. IEEE INFOCOM, pp 2435–2443Google Scholar
  64. Liang X, Li X, Luan TH, Lu R, Lin X, Shen X (2012) Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans Veh Technol 61(7):3209–3222CrossRefGoogle Scholar
  65. Lucas MM, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: WPES 2008: Proceedings of the 7th ACM workshop on Privacy in the electronic society, ACM, New York, pp 1–8Google Scholar
  66. Luo B, Lee D (2009) On protecting private information in social networks: a proposal. In: Proceeding of IEEE International-Conference on Data Engineering, pp 1603–1606Google Scholar
  67. Luo W, Xie Q, Hengartner U (2009) FaceCloak: architecture for user privacy on social networking sites. In: Proceeding of IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), Canada, pp 26–33Google Scholar
  68. Madden M, Smith A (2009) Reputation management and social media. Technical report, Pew Internet & American Life ProjectGoogle Scholar
  69. Magkos E, Kotzanikolaou P, Sioutas S, Oikonomou K (2010) A distributed privacy-preserving scheme for location-based queries. In: Proc. IEEE WoWMoM 1–6Google Scholar
  70. Malhotra NK, Kim SS, Agarwal J (2004). Internet users’ information privacy concerns (IUIPC): the construct, thescale, and a causal model. Inf Syst Res 15(4): 336–355CrossRefGoogle Scholar
  71. Mani M, Ngyuen AM, Crespi N (2009) What’s up: P2P spontaneous social networking. In: IEEE International Conference on Pervasive Computing and Communications (pp 1–2). Galveston: TX, USAGoogle Scholar
  72. Milne GR, Culnan MJ (2004) Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices. J Interact Mark 18(3):15–29CrossRefGoogle Scholar
  73. Mtibaa A, Harras KA, (2011) FOG: fairness in mobile opportunistic networking. In: Proc. IEEE SECON, 2011, pp 260–268Google Scholar
  74. Najaflou Y, Jedari B, Xia F (2013) Safety challenges and solutions in mobile social networks. IEEE Syst J 9(3):834–854.  https://doi.org/10.1109/JSYST.2013.2284696 CrossRefGoogle Scholar
  75. Narendula R (2010)The case of decentralized online social networks. School of Computer and Communication Sciences, EPFL, Switzerland. https://infoscience.epfl.ch/record/174927/files/report.pdfGoogle Scholar
  76. Narendula R, Papaioannou TG, Aberer K (2010a) Privacyaware and highly-available OSN profiles. In: Proc. WETICEGoogle Scholar
  77. Narendula R, Papaioannou TG, Aberer K (2010b) Privacy-Aware and Highly-Available OSN Profiles. In: Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, pp 211–216Google Scholar
  78. Narendula R, Papaioannou G, Aberer K (2011) My3: a highly-available P2P-based online social network. In: Proceeding of the IEEE International Conference on Peer-to-Peer Computing (IEEE P2P’11), (2011), pp. 166–167Google Scholar
  79. Nov O, Wattal S (2009) Social computing privacy concerns: antecedents and effects. In: Proceedings of CHI2009, pp 333–336Google Scholar
  80. Paine C, Reips U-D, Stieger S, Joinson A, Buchanan T (2007) Internet users’ perceptions of ‘privacy concerns’ and ‘privacy actions’. Int J Hum Comput Stud 65:526–536CrossRefGoogle Scholar
  81. Patsakis C, Zigomitros A, Papageorgiou A, Galván-López E (2014) Distributing privacy policies over multimedia content across multiple online social networks. Comput Netw 75:531–543.  https://doi.org/10.1016/j.comnet.2014.08.023 CrossRefGoogle Scholar
  82. Phelps J, Nowak G, Ferrell E (2000) Privacy concerns and consumer willingness to provide personal information. J Public Policy Mark 19(1):27–41CrossRefGoogle Scholar
  83. Phelps JE, D’Souza G, Nowak GJ (2001) Antecedents and consequences of consumer privacy concerns: an empirical investigation. Journal of Interactive Marketing 15(4):2–17CrossRefGoogle Scholar
  84. Qi X, Hengartner U (2011) Privacy-preserving matchmaking for mobile social networking secure against malicious users. In: Proc. PST, pp 252–259Google Scholar
  85. Raji F, Davarpanah Jazi M, Miri A (2013) DEFF: a new architecture for private online social networks. Int J Secur Commun Netw 6:1460–1470.  https://doi.org/10.1002/sec.533 CrossRefGoogle Scholar
  86. Raji F, Davarpanah Jazi M, Miri A (2014) PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability. Int J IET Inf Secur.  https://doi.org/10.1049/iet-ifs.2013.0256 Google Scholar
  87. Schiberg D (2008) A peer-to-peer infrastructure for social networks. Disploma Thesis, Technical University Berlin, GermanyGoogle Scholar
  88. Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New YorkMATHGoogle Scholar
  89. Shakimov A, Lim H, Caceress R, Cox P, Li K, Liu D, Varshavsky A (2011) Vis-vis: privacy-preserving online social networking via virtual individual servers. In: Proceeding of the 6th International Conference on Communication System and Networks (COMSNETS), pp 1–10Google Scholar
  90. Sheehan KB, Hoy MG (1999) Flaming, complaining, abstaining: how online users respond to privacy concerns. J Advert 28(3):37–51CrossRefGoogle Scholar
  91. Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of Facebook and LinkedIn. In: Proceedings of Group 2009, pp 95–104Google Scholar
  92. Statista (2016) December 2016. Available at https://www.statista.com/topics/1164/socialnetworks/
  93. Stutzman F, Kramer Duffield J (2010) Friends only: examining a privacy-enhancing behavior in facebook. In: Proceedings of CHI2010, pp 1553–1562Google Scholar
  94. Sun J, Zhu X, Fang Y (2010) a privacy-preserving scheme for online social networks with efficient revocation. In: Procceding of the 29th of Information Communication (IEEE INFOCOM), pp 1–9Google Scholar
  95. Tootoonchian A, Gollu K, Kiran S, Saroiu Y, Ganjali Y, Wolman A (2008) Lockr: Social Access Control for Web 2.0. In: Proceedings of the First ACM SIGCOMM Workshop on Online Social Networks (WOSN)Google Scholar
  96. Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on Emerging networking experiments and technologies, Italy, pp 169–180Google Scholar
  97. Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social network sites. Bull Sci Technol Soc 28(1):20–36CrossRefGoogle Scholar
  98. UN Global Pulse (2015) Mapping the risk-utility landscape: mobile data for sustainable development & humanitarian action. Global Pulse Project Series no. 18, 2015Google Scholar
  99. Vastardis N, Yang K (2013) Mobile social networks: Architectures, social properties and key research challenges. IEEE Commun Surveys Tuts 15(3):1355–1371CrossRefGoogle Scholar
  100. Wang Y, Komanduri S, Giovanni Leon P (2011) I regretted the minute I pressed share: a Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USAGoogle Scholar
  101. Wang Y, Hou J, Xia Y, HZ (2015) efficient privacy preserving matchmaking for mobile social networking. Concurr Comput Pract Exp.  https://doi.org/10.1002/cpe.3284 Google Scholar
  102. Wei C, Jie W, Tan CC (2011) Enhancing mobile social network privacy. In: IEEE GLOBECOM, pp 1–5Google Scholar
  103. Wei W, Xu F, Li Q (2012) Mobishare: flexible privacy-preserving location sharing in mobile online social networks. In: IEEE INFOCOM, pp 2616–2620Google Scholar
  104. Wu Y, Hui P, Xiaoying Z, Hong C, Cuiping L (2015) Publish me and protect me: personalized and flexible location privacy protection in mobile social networks. In: IEEE International Symposium on Quality of Service, IWQoS 2015, Portland, OR, USA, pp 147–152Google Scholar
  105. Xiao X, Chen C, Sangaiah AK, Hu G, Ye R, Jiang Y (2017) CenLocShare: a centralized privacy-preserving location-sharing system for mobile online social networks. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2017.01.035 Google Scholar
  106. Xiaohui L, Xu L, Rongxing L, Xiaodong L, Xuemin S (2011) Finegrained identification with real-time fairness in mobile social networks. In: Proc. IEEE ICC, 2011, pp. 1–5Google Scholar
  107. Xu H (2009) Consumer responses to the introduction of privacy protection measures: an exploratory research framework. Int J E-Bus Res 5(2):21–47 (Special issue on the Protection of Privacy in E-Business)CrossRefGoogle Scholar
  108. Xu H, Dinev T, Smith HJ, Hart P (2008) Examining the formation of individual’s information privacy concerns: toward an Integrative view. In: Paper read at 29th Annual International Conference on Information Systems (ICIS), at Paris, FranceGoogle Scholar
  109. Xu F, Michael K, Chen X (2013) Factors affecting privacy disclosure on social network sites: an integrated model. Electron Commer Res 13:151–168.  https://doi.org/10.1007/s10660-013-9111-6 CrossRefGoogle Scholar
  110. Yang S, Wang K (2009) The influence of information sensitivity compensation on privacy concern and behavioral intention. Data Base Adv Inf Syst 40(1):38–51MathSciNetCrossRefGoogle Scholar
  111. Ye A, Chen Q, Xu L, Wu W (2016) The flexible and privacy-preserving proximity detection in mobile social network. Future Gener Comput Syst.  https://doi.org/10.1016/j.future.2016.12.012 Google Scholar
  112. Zhu Y, Hu Z, Wang H, Hu H, Ahn GJ (2010) A Collaborative framework for privacy protection in online social networks. In: Proceedings of the 6th International Conference on Collaborative Computing, USA, pp 40–45Google Scholar

Copyright information

© Springer-Verlag GmbH Austria, part of Springer Nature 2018

Authors and Affiliations

  • Razieh Malekhosseini
    • 1
  • Mehdi Hosseinzadeh
    • 2
    • 3
  • Keyvan Navi
    • 4
    • 5
  1. 1.Department of Computer Engineering, Science and Research BranchIslamic Azad UniversityTehranIran
  2. 2.Iran University of Medical SciencesTehranIran
  3. 3.Computer ScienceUniversity of Human DevelopmentSulaimaniyahIraq
  4. 4.Nanotechnology and Quantum Computing LabShahid Beheshti University, G.C.TehranIran
  5. 5.School of Computer ScienceInstitute for Research in fundamental science (IPM)TehranIran

Personalised recommendations