F. Abel, Q. Gao, G. J. Houben, and K. Tao, Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web, ESWC'11, pp.375-389, 2011.
DOI : 10.1007/978-3-642-17746-0_30

M. Blanton and E. Aguiar, Private and oblivious set and multiset operations, ASIACCS 2012, pp.40-41, 2012.

E. De-cristofaro, P. Gasti, and G. Tsudik, Fast and Private Computation of Cardinality of Set Intersection and Union, CANS 2012, pp.218-231, 2012.
DOI : 10.1007/978-3-642-35404-5_17

J. Freedman, K. Nissim, and B. Pinkas, Efficient Private Matching and Set Intersection, pp.1-19, 2004.
DOI : 10.1007/978-3-540-24676-3_1

S. Hohenberger and S. Weis, Honest-Verifier Private Disjointness Testing Without Random Oracles, pp.277-294, 2006.
DOI : 10.1007/11957454_16

A. Inan, M. Kantarcioglu, E. Bertino, and M. Scannapieco, A Hybrid Approach to Private Record Linkage, 2008 IEEE 24th International Conference on Data Engineering, pp.496-505, 2008.
DOI : 10.1109/ICDE.2008.4497458

A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino, Private record matching using differential privacy, Proceedings of the 13th International Conference on Extending Database Technology, EDBT '10, pp.123-134, 2010.
DOI : 10.1145/1739041.1739059

A. Inan, M. Kantarcioglu, G. Ghinita, and E. Bertino, A Hybrid Approach to Private Record Matching, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.5, pp.684-698, 2012.
DOI : 10.1109/TDSC.2012.46

L. Kissner and D. X. Song, Privacy-Preserving Set Operations, CRYPTO 2005, pp.241-257, 2005.
DOI : 10.1007/11535218_15

P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EUROCRYPT 1999, pp.223-238, 1999.
DOI : 10.1007/3-540-48910-X_16

D. Sánchez, M. Batet, D. Isern, and A. Valls, Ontology-based semantic similarity: A new feature-based approach, Expert Systems with Applications, vol.39, issue.9, pp.7718-7728, 2012.
DOI : 10.1016/j.eswa.2012.01.082

J. Vaidya and C. Clifton, Secure set intersection cardinality with application to association rule mining, Journal of Computer Security, vol.13, issue.4, pp.593-622, 2005.
DOI : 10.3233/JCS-2005-13401

A. Viejo, D. Sánchez, and J. Castelì-a-roca, Preventing automatic user profiling in Web 2.0 applications, Knowledge-Based Systems, vol.36, pp.191-205, 2012.
DOI : 10.1016/j.knosys.2012.07.001

A. Viejo, D. Sánchez, and J. Castelì-a-roca, Using Profiling Techniques to Protect the User???s Privacy in Twitter, MDAI 2012, pp.161-172, 2012.
DOI : 10.1007/978-3-642-34620-0_16

A. C. Wefollow and . Yao, How to generate and exchange secrets, com 19. WhoToFollow, pp.162-167, 1986.

K. Zoltan and S. Johann, Semantic analysis of microposts for efficient people to people interactions, 2011 RoEduNet International Conference 10th Edition: Networking in Education and Research, p.14, 2011.
DOI : 10.1109/RoEduNet.2011.5993688