Graph data anonymization, de-anonymization attacks, and de-anonymizability quantification: A survey

S Ji, P Mittal, R Beyah - IEEE Communications Surveys & …, 2016‏ - ieeexplore.ieee.org
Nowadays, many computer and communication systems generate graph data. Graph data
span many different domains, ranging from online social network data from networks like …

The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization

L Atzori, A Iera, G Morabito, M Nitti - Computer networks, 2012‏ - Elsevier
Recently there has been quite a number of independent research activities that investigated
the potentialities of integrating social networking concepts into Internet of Things (IoT) …

Cryptocurrency networks: A new P2P paradigm

S Delgado-Segura, C Pérez-Solà… - Mobile Information …, 2018‏ - Wiley Online Library
P2P networks are the mechanism used by cryptocurrencies to disseminate system
information while kee** the whole system as much decentralized as possible …

Smartbuddy: defining human behaviors using big data analytics in social internet of things

A Paul, A Ahmad, MM Rathore… - IEEE Wireless …, 2016‏ - ieeexplore.ieee.org
As we delve into the Internet of Things, we are witnessing intensive interaction and
heterogeneous communication among different devices over the Internet. Consequently …

On trust models and trust evaluation metrics for ad hoc networks

G Theodorakopoulos, JS Baras - IEEE Journal on selected …, 2006‏ - ieeexplore.ieee.org
Within the realm of network security, we interpret the concept of trust as a relation among
entities that participate in various protocols. Trust relations are based on evidence created …

Taxonomy of trust: Categorizing P2P reputation systems

S Marti, H Garcia-Molina - Computer Networks, 2006‏ - Elsevier
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …

[PDF][PDF] A survey of solutions to the sybil attack

BN Levine, C Shields, NB Margolin - University of Massachusetts …, 2006‏ - git.gnunet.org
Many security mechanisms are based on specific assumptions of identity and are vulnerable
to attacks when these assumptions are violated. For example, impersonation is the well …

{SecGraph}: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

S Ji, W Li, P Mittal, X Hu, R Beyah - 24th USENIX Security Symposium …, 2015‏ - usenix.org
In this paper, we analyze and systematize the state-ofthe-art graph data privacy and utility
techniques. Specifically, we propose and develop SecGraph (available at [1]), a uniform and …

Sybil-resistant DHT routing

G Danezis, C Lesniewski-Laas, MF Kaashoek… - … –ESORICS 2005: 10th …, 2005‏ - Springer
Abstract Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but
at the same time vulnerable to disruptive nodes. Designers of such systems want them used …

Preserving link privacy in social network based systems

P Mittal, C Papamanthou, D Song - arxiv preprint arxiv:1208.6189, 2012‏ - arxiv.org
A growing body of research leverages social network based trust relationships to improve
the functionality of the system. However, these systems expose users' trust relationships …