Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Probabilistic encryption & how to play mental poker keeping secret all partial information
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Foundations of Cryptography: Volume 2, Basic Applications
Foundations of Cryptography: Volume 2, Basic Applications
Privacy-preserving collaborative data mining
Privacy-preserving collaborative data mining
Measuring Topological Anonymity in Social Networks
GRC '07 Proceedings of the 2007 IEEE International Conference on Granular Computing
Privacy Preserving Collaborative Social Network
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
Privacy-Preserving Collaborative Social Networks
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Privacy-preserving social network analysis for criminal investigations
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Preserving Privacy in Social Networks Against Neighborhood Attacks
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
On Protecting Private Information in Social Networks: A Proposal
ICDE '09 Proceedings of the 2009 IEEE International Conference on Data Engineering
Preserving Privacy in Social Networks: A Structure-Aware Approach
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 01
Privacy preserving social networking through decentralization
WONS'09 Proceedings of the Sixth international conference on Wireless On-Demand Network Systems and Services
Privacy-Preserving Relationship Path Discovery in Social Networks
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
A social network is the mapping and measuring of relationships and flows between individuals, groups, organizations, computers, websites, and other information/knowledge processing entities. The nodes in the network are the people and groups, while the links show relationships or flows between the nodes. Social networks provide both a visual and a mathematical analysis of relationships. Social network has been researched for a while. However, to our best knowledge, privacy-preserving social networks have not been well explored. In this paper, we would like to address how to build up a social network involving multiple parties. Data collection is a necessary step in the social-network-construction process. Due to privacy reasons, collecting data from different parties becomes difficult and these concerns may prevent the parties from directly sharing the data. How multiple parties collaboratively construct a social network without breaching data privacy presents a challenge. The objective of this paper is to provide a solution for privacy-preserving collaborative social-network problem.