The official PGP user's guide
The Design of Rijndael
OpenDHT: a public DHT service and its uses
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Secure web applications via automatic partitioning
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Collusion resistant broadcast encryption with short ciphertexts and private keys
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Imagined communities: awareness, information sharing, and privacy on the facebook
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Persona: an online social network with user-defined privacy
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Privacy-enabling social networking over untrusted networks
Proceedings of the 2nd ACM workshop on Online social networks
Privacy, cost, and availability tradeoffs in decentralized OSNs
Proceedings of the 2nd ACM workshop on Online social networks
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Personality traits, usage patterns and information disclosure in online communities
Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology
Sh@re: negotiated audit in social networks
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Proceedings of the 2010 ICSE Workshop on Software Engineering in Health Care
PrPl: a decentralized social networking infrastructure
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
VisualSec: a secure message delivery scheme for online social networks based on profile images
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A privacy-preserving scheme for online social networks with efficient revocation
INFOCOM'10 Proceedings of the 29th conference on Information communications
User-friendly matching protocol for online social networks
Proceedings of the 17th ACM conference on Computer and communications security
unfriendly: multi-party privacy risks in social networks
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
Personal data vaults: a locus of control for personal data streams
Proceedings of the 6th International COnference
Secure collaborative social networks
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Virtual private social networks
Proceedings of the first ACM conference on Data and application security and privacy
Re-Socializing Online Social Networks
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
EASiER: encryption-based access control in social networks with efficient revocation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
All liaisons are dangerous when all your friends are known to us
Proceedings of the 22nd ACM conference on Hypertext and hypermedia
A reachability-based access control model for online social networks
Databases and Social Networks
Secure data preservers forweb services
WebApps'11 Proceedings of the 2nd USENIX conference on Web application development
On the privacy of anonymized networks
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy-enhanced social-network routing
Computer Communications
LotusNet: Tunable privacy for distributed online social network services
Computer Communications
Poster: privacy-preserving profile similarity computation in online social networks
Proceedings of the 18th ACM conference on Computer and communications security
Boundary regulation in social media
Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work
Preserving privacy in online social networks
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Designing privacy-aware social networks: a multi-agent approach
Proceedings of the 2nd International Conference on Web Intelligence, Mining and Semantics
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Who knows about me?: an analysis of age-related disclosure preferences
BCS-HCI '11 Proceedings of the 25th BCS Conference on Human-Computer Interaction
TrustSplit: usable confidentiality for social network messaging
Proceedings of the 23rd ACM conference on Hypertext and social media
Social networking with frientegrity: privacy and integrity with an untrusted provider
Security'12 Proceedings of the 21st USENIX conference on Security symposium
For human eyes only: security and usability evaluation
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Exploring decentralization dimensions of social networking services: adversaries and availability
Proceedings of the First ACM International Workshop on Hot Topics on Interdisciplinary Social Networks Research
Preventing automatic user profiling in Web 2.0 applications
Knowledge-Based Systems
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Enabling private conversations on Twitter
Proceedings of the 28th Annual Computer Security Applications Conference
Private friends on a social networking site operated by an overly curious SNP
NSS'12 Proceedings of the 6th international conference on Network and System Security
C4PS - helping facebookers manage their privacy settings
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Mosaic: quantifying privacy leakage in mobile networks
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Location tracking via social networking sites
Proceedings of the 5th Annual ACM Web Science Conference
Appinspect: large-scale evaluation of social networking apps
Proceedings of the first ACM conference on Online social networks
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Virtual private social networks and a facebook implementation
ACM Transactions on the Web (TWEB)
An integrated framework for enhancing privacy in online social networks
Proceedings of the 6th ACM India Computing Convention
Crypto-Book: an architecture for privacy preserving online identities
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
CP2: Cryptographic privacy protection framework for online social networks
Computers and Electrical Engineering
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
Increasingly, Internet users trade privacy for service. Facebook, Google, and others mine personal information to target advertising. This paper presents a preliminary and partial answer to the general question "Can users retain their privacy while still benefiting from these web services?". We propose NOYB, a novel approach that provides privacy while preserving some of the functionality provided by online services. We apply our approach to the Facebook online social networking website. Through a proof-of-concept implementation we demonstrate that NOYB is practical and incrementally deployable, requires no changes to or cooperation from an existing online service, and indeed can be non-trivial for the online service to detect.