Search
for Author
All Reviews
Zou, Xukai
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
2
of
2
reviews
A two-stage deanonymization attack against anonymized social networks
Peng W., Li F., Zou X., Wu J. IEEE Transactions on Computers 63(2): 290-303, 2014. Type: Article
We live in an era of social networks where privacy control is a massive concern. Users leave digital traces, which may breach privacy even after anonymization. Social networking service providers collect user-provided data, and the use...
...
Nov 4 2014
Secure group communications over data networks
Zou X., Ramamurthy B., Magliveras S., Springer-Verlag Telos, 2004. 172 pp. Type: Book (9780387229706)
The Internet has been the main driving force behind applications that allow people to collaborate with each other. Examples of these include teleconferencing, telemedicine, interactive simulations, grid computing, and virtual private n...
...
Mar 1 2006
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy