Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Zou, Xukai Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  A two-stage deanonymization attack against anonymized social networks
Peng W., Li F., Zou X., Wu J. IEEE Transactions on Computers 63(2): 290-303, 2014.  Type: Article

We live in an era of social networks where privacy control is a massive concern. Users leave digital traces, which may breach privacy even after anonymization. Social networking service providers collect user-provided data, and the use...
...
Nov 4 2014  
  Secure group communications over data networks
Zou X., Ramamurthy B., Magliveras S., Springer-Verlag Telos, 2004. 172 pp.  Type: Book (9780387229706)

The Internet has been the main driving force behind applications that allow people to collaborate with each other. Examples of these include teleconferencing, telemedicine, interactive simulations, grid computing, and virtual private n...
...
Mar 1 2006  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy