Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
The effectiveness and efficiency of agglomerative hierarchic clustering in document retrieval
The effectiveness and efficiency of agglomerative hierarchic clustering in document retrieval
Recent trends in hierarchic document clustering: a critical review
Information Processing and Management: an International Journal
Information retrieval: data structures and algorithms
Information retrieval: data structures and algorithms
Anonymous Web transactions with Crowds
Communications of the ACM
On secure and pseudonymous client-relationships with multiple servers
ACM Transactions on Information and System Security (TISSEC)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Mining e-mail content for author identification forensics
ACM SIGMOD Record
Clustering words with the MDL principle
COLING '96 Proceedings of the 16th conference on Computational linguistics - Volume 1
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Usable presentation of secure pseudonyms
Proceedings of the 2005 workshop on Digital identity management
Next-generation digital forensics
Communications of the ACM - Next-generation cyber forensics
Email alias detection using social network analysis
Proceedings of the 3rd international workshop on Link discovery
You are what you say: privacy risks of public mentions
SIGIR '06 Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval
Proceedings of the 16th international conference on World Wide Web
On anonymizing query logs via token-based hashing
Proceedings of the 16th international conference on World Wide Web
Challenges in mining social network data: processes, privacy, and paradoxes
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
"I know what you did last summer": query logs and user privacy
Proceedings of the sixteenth ACM conference on Conference on information and knowledge management
Vanity fair: privacy in querylog bundles
Proceedings of the 17th ACM conference on Information and knowledge management
Stylometric Identification in Electronic Markets: Scalability and Robustness
Journal of Management Information Systems
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Privacy-Preserving Data Publishing
Foundations and Trends in Databases
Fuzzy sets in the fight against digital obesity
Fuzzy Sets and Systems
Cuisine: Classification using stylistic feature sets and-or name-based feature sets
Journal of the American Society for Information Science and Technology
On the effectiveness of anonymizing networks for web search privacy
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Communications of the ACM
An article language model for BBS search
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Mining writeprints from anonymous e-mails for forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
AUTOMATIC ANNOTATION OF AMBIGUOUS PERSONAL NAMES ON THE WEB
Computational Intelligence
What's in a name?: an unsupervised approach to link users across communities
Proceedings of the sixth ACM international conference on Web search and data mining
International Journal of Agent Technologies and Systems
Combining Entity Matching Techniques for Detecting Extremist Behavior on Discussion Boards
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
REPLOT: REtrieving profile links on Twitter for suspicious networks detection
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Detecting multiple aliases in social media
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Web search query privacy: Evaluating query obfuscation and anonymizing networks
Journal of Computer Security
Hi-index | 0.02 |
It is increasingly common for users to interact with the web using a number of different aliases. This trend is a double-edged sword. On one hand, it is a fundamental building block in approaches to online privacy. On the other hand, there are economic and social consequences to allowing each user an arbitrary number of free aliases. Thus, there is great interest in understanding the fundamental issues in obscuring the identities behind aliases.However, most work in the area has focused on linking aliases through analysis of lower-level properties of interactions such as network routes. We show that aliases that actively post text on the web can be linked together through analysis of that text. We study a large number of users posting on bulletin boards, and develop algorithms to anti-alias those users: we can with a high degree of success identify when two aliases belong to the same individual.Our results show that such techniques are surprisingly effective, leading us to conclude that guaranteeing privacy among aliases that post actively requires mechanisms that do not yet exist.