[1] |
WONG R K, VIDYALAKSHMI B S.Privacy Leakage via Attribute Inference in Directed Social Networks[C]// Springer. International Conference on Information and Communications Security, April 5-7, 2016,Irbid, Jordan. Berlin Heidelberg: Springer,2016: 333-346.
|
[2] |
ZENG Y, SUN Y, XING L, et al.Online Social Networks Privacy Study Through TAPE Framework[J]. IEEE Journal of Selected Topics in Signal Processing, 2015,9(7):1270-1284.
|
[3] |
GATES C E.Access Control Requirements for Web 2.0 Security and Privacy[C]// IEEE.Workshop on Web 2.0 Security and Privacy 2007. May 24,2007, Oakland, California. New York: IEEE, 2007:249-256.
|
[4] |
徐剑,赵英南,田永纯,等. 融合二维码与人脸识别的会议身份认证系统研究[J]. 信息网络安全,2015(4):13-18.
|
[5] |
PANG J, ZHANG Y.A New Access Control Scheme for Facebook-Style Social Networks[C]// IEEE. 9th International Conference on Availability, Reliability and Security, September 8-12, 2014 , Fribourg, Switzerland. New York: IEEE, 2014: 1-10.
|
[6] |
SAHAI A, WATERS B.Fuzzy Identity-Based Encryption[C]// Springer. 24th Annual International Conference on Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Berlin Heidelberg: Springer, 2005: 457-473.
|
[7] |
GOYAL V, PANDEY O, SAHAI A, et al.Attribute-Based Encryption for Fine-grained Access Control of Encrypted Data[C]// ACM. CCS'06 Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, Virginia, USA. New York: ACM,2006:89-98.
|
[8] |
ZHANG Y, CHEN X, LI J, et al.FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation[C]//IEEE. 5th International Conference on Intelligent Networking and Collaborative Systems, September 9-11, 2013, Xi'an, China. Washington, DC, USA:IEEE Computer Society, 2013: 38-45.
|
[9] |
ILIA P, POLAKIS I, ATHANASOPOULOS E, et al.Face/Off: Preventing Privacy Leakage From Photos in Social Networks[C]// ACM. CCS'5 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, Denver, Colorado ,New York, USA. NY, USA: ACM ,2015:781-792.
|
[10] |
XU K, GUO Y, GUO L, et al.My Privacy My Decision: Control of Photo Sharing on Online Social Networks[J]. IEEE Transactions on Dependable & Secure Computing, 2015,14(2):199-210.
|
[11] |
PLATT J, CRISTIANINI N, SHAWE-TAYLOR J.Large Margin DAGs for Multiclass Classification[J]. Advances in Neural Information Processing Systems, 2000, 12(3): 547-553.
|
[12] |
Xiao-Bo W.Analysis of AES Encipher Algorithm and Its C++ Language Implementation[J]. Network & Computer Security, 2007, 7(12):44-46.
|
[13] |
张付霞,蒋朝惠. 一种基于网格聚类的查询隐私匿名算法研究[J]. 信息网络安全,2015(8):53-58.
|