Secure Distributed Framework for Achieving ??-Differential Privacy, Privacy Enhancing Technologies, pp.120-139, 2012. ,
DOI : 10.1007/978-3-642-31680-7_7
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography, Proceedings of the 16th international conference on World Wide Web, pp.181-190, 2007. ,
Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009. ,
DOI : 10.1145/1594977.1592585
Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, p.6, 2009. ,
DOI : 10.1145/1609956.1609962
A firm foundation for private data analysis, Communications of the ACM, vol.54, issue.1, pp.86-95, 2011. ,
DOI : 10.1145/1866739.1866758
Clone2clone (c2c): Peer-to-peer networking of smartphones on the cloud, 5th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud13), 2013. ,
Optimizing linear counting queries under differential privacy, Proceedings of the twenty-ninth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems of data, PODS '10, pp.123-134, 2010. ,
DOI : 10.1145/1807085.1807104
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.190.4333
Meshcloak: A map-based location privacy model for continuous query in mobile services ,
A comparison of differentially private linear counting queries ,
Anonymization of centralized and distributed social networks by sequential clustering. Knowledge and Data Engineering, IEEE Transactions on, vol.25, issue.2, pp.311-324, 2013. ,
A Survey of Privacy-Preservation of Graphs and Social Networks, Managing and mining graph data, pp.421-453, 2010. ,
DOI : 10.1007/978-1-4419-6045-0_14
On Randomness Measures for Social Networks, SDM, pp.709-720, 2009. ,
DOI : 10.1137/1.9781611972795.61
Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008. ,
DOI : 10.1109/ICDE.2008.4497459