Agrawal R, Srikant R (2000) Privacy preserving data mining. ACM SIGMOD 29:439–450
CrossRef
Google Scholar
Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput Commun Rev 39(4):135–146
CrossRef
Google Scholar
Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. ACM Trans Intell Syst Technol 2:22:1–22:37
Google Scholar
Boyd D, Ellison NB (2008) Social network sites: definition, history, and scholarship. J Comput-Mediated Commun 13(1):210–230
Google Scholar
Chen J, Geyer W, Dugan C, Muller M, Guy I (2009) Make new friends, but keep the old: recommending people on social networking sites. In: Proceedings of the 27th international conference on Human factors in computing systems, pp 201–210
Google Scholar
Clarkson MR, Chong S, Myers A (2008) Civitas: toward a secure voting system. In: IEEE symposium on security and privacy, pp 354–368, May 2008
Google Scholar
Cristofaro ED, Soriente C, Tsudik G, Williams A (2012) Hummingbird: privacy at the time of twitter. In: IEEE symposium on security and privacy, pp 285–299
Google Scholar
Cutillo LA, Molva R, Onen M (2011) Analysis of privacy in online social networks from the graph theory perspective. In: Proceedings of the global telecommunications conference (GLOBECOM 2011). IEEE, Houston, Texas, USA, pp 1–5, Dec 2011
Google Scholar
Dai B-R, Lee C-Y, Chung C-H (2011) A framework of recommendation system based on both network structure and messages. In: International conference on advances in social networks analysis and mining (ASONAM’ 11), pp 709–714, July 2011
Google Scholar
Delgado J, Rodríguez E, Llorente S (2010) User’s privacy in applications provided through social networks. In: Proceedings of second ACM SIGMM workshop on social, media, pp 39–44
Google Scholar
Dong W, Dave V, Qiu L, Zhang Y (2011) Secure friend discovery in mobile social networks. In: Proceedings of IEEE INFOCOM, pp 1647–1655, Apr 2011
Google Scholar
Dwork C (2006) Differential privacy. In: ICALP, Lecture Notes in Computer Science, Springer, pp 1–12
Google Scholar
Dwork C (2008) Differential privacy: a survey of results. In: Proceedings of the 5th international conference on theory and applications of models of computation, TAMC’08. Springer-Verlag, Berlin, Heidelberg, pp 1–19
Google Scholar
Feldman AJ, Blankstein A, Freedman MJ, Felten EW (2012) Social networking with frientegrity: privacy and integrity with an untrusted provider. In: Proceedings of the 21st USENIX conference on security symposium, Security’12. Berkeley, CA, USA, pp 31–31. USENIX Association
Google Scholar
Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15:1–15:15
Google Scholar
Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. IEEE Internet Comput 15(4):56–63
CrossRef
Google Scholar
Goldreich O (2004) The foundations of cryptography, vol 2. In: General Cryptographic Protocols. Cambridge University Press, Cambridge
Google Scholar
Goldreich O (2004) The foundations of cryptography, vol 2. In: Encryption Schemes. Cambridge University Press, Cambridge
Google Scholar
Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18:186–208
CrossRef
MATH
MathSciNet
Google Scholar
Gou L, You F, Guo J, Wu L, Zhang XL (2011) Sfviz: interest-based friends exploration and recommendation in social networks. In: Proceedings of visual information communication-international symposium (VINCI ’11), ACM, pp 1–10
Google Scholar
Krishnamurthy B, Wills CE (2010) On the leakage of personally identifiable information via online social networks. SIGCOMM Comput Commun Rev 40(1):112–117
CrossRef
Google Scholar
Kumar R, Novak J, Tomkins A (2006) Structure and evolution of online social networks. In: The 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 611–617
Google Scholar
Liben-Nowell D, Kleinberg J (2007) The link-prediction problem for social networks. J Am Soc Inf Sci Technol 58:1019–1031
CrossRef
Google Scholar
Lindell Y, Pinkas B (2002) Privacy preserving data mining. J Cryptol 15:177–206
CrossRef
MATH
MathSciNet
Google Scholar
Lo S, Lin C (2006) Wmr-a graph-based algorithm for friend recommendation. In: Proceedings of the 2006 IEEE/WIC/ACM international conference on web intelligence (WI ’06), IEEE Computer Society, pp 121–128
Google Scholar
Lucas MM, Borisov N (2008) Flybynight: mitigating the privacy risks of social networking. In: Proceedings of the 7th ACM workshop on privacy in the electronic society, WPES ’08. ACM, New York, NY, USA, pp 1–8
Google Scholar
Machanavajjhala A, Korolova A, Sarma AD (2011) Personalized social recommendations: accurate or private. Proc VLDB Endowment 4:440–450
Google Scholar
Milgram S (1967) The small world problem. Psychol Today 2:60–67
Google Scholar
Mislove A, Marcon M, Gummadi KP, Druschel P, Bhattacharjee B (2007) Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM conference on internet measurement (IMC ’07), pp 29–42
Google Scholar
Naruchitparames J, Giine M, Louis S (2011) Friend recommendations in social networks using genetic algorithms and network topology. In: IEEE congress on evolutionary computation (CEC), pp 2207–2214, June 2011
Google Scholar
NIST. Advanced encryption standard. Technical Report NIST Special Publication FIPS-197, National Institute of Standards and Technology, 2001
Google Scholar
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on theory and application of cryptographic techniques, Springer-Verlag, pp 223–238
Google Scholar
Rivest RL, Adleman L, Dertouzos ML (1978) On data banks and privacy homomorphisms. In: Foundation of secure computations, Academic Press, pp 169–177
Google Scholar
Silva N, Tsang I-R, Cavalcanti G, Tsang I-J (2010) A graph-based friend recommendation system using genetic algorithm. In: IEEE congress on evolutionary computation (CEC), pp 1–7, July 2010
Google Scholar
Srivastava J, Ahmad MA, Pathak N, Hsu DKW (2008) Data mining based social network analysis from online behavior. In: Tutorial at the 8th SIAM international conference on data mining (SDM’ 08)
Google Scholar
Sun J, Zhu X, Fang Y (2010) A privacy-preserving scheme for online social networks with efficient revocation. In: Proceedings of the 29th conference on information communications, INFOCOM’10. IEEE Press, Piscataway, NJ, USA, pp 2516–2524
Google Scholar
Tootoonchian A, Saroiu S, Ganjali Y, Wolman A (2009) Lockr: better privacy for social networks. In: Proceedings of the 5th international conference on emerging networking experiments and technologies, CoNEXT ’09. ACM, New York, NY, USA, pp 169–180
Google Scholar
Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press, Cambridge
CrossRef
Google Scholar
Xie X (2010) Potential friend recommendation in online social network. In: IEEE/ACM international conference on cyber, physical and social computing (CPSCom), pp 831–835, Dec 2010
Google Scholar
Yang Y, Lutes J, Li F, Luo B, Liu P (2012) Stalking online: on user privacy in social networks. In: Proceedings of the second ACM conference on data and application security and privacy (CODASPY ’12), ACM, pp 37–48
Google Scholar
Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, IEEE Computer Society, pp 160–164
Google Scholar
Yao AC (1986) How to generate and exchange secrets. In: Proceedings of the 27th symposium on foundations of computer science, IEEE Computer Society, pp 162–167
Google Scholar