|
ComputingReviews.com
|
A two-stage deanonymization attack against anonymized social networks Peng W., Li F., Zou X., Wu J. IEEE Transactions on Computers63(2):290-303,2014.Type:Article |
|
|
|
Published By: IEEE Computer Society |
|
|
|
|
|
|
|
|
Use your personal or institutional subscription to read the fulltext of the article.
|
|
|
|
|
|
|
|
|
|
|
|