Beye, M., Jeckmans, A., Erkin, Z., Hartel, P., Lagendijk, R., Tang, Q.: Literature overview - privacy in online social networks. Technical report, Centre for Telematics and Information Technology, University of Twente (2010)
Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer (2004)
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
Hay, M., Miklau, G., Jensen, D., Towsley, D.,Weis, P.: Resisting structural re-identification in anonymized social networks. Proc. VLDB Endow. 1(1), 102-114 (2008)
Jeckmans, A., Tang, Q., Hartel, P.: Privacy-preserving profile matching using the social graph. In: The Third International Conference on Computational Aspects of Social Networks, pp. 42-47 (2011)
Narayanan, A., Shmatikov, V.: De-anonymizing social networks. In: Proceedings of the 2009 30th IEEE Symposium on Security and Privacy, pp. 173-187 (2009)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
Palen, L., Dourish, P.: Unpacking "privacy" for a networked world. In: CHI 2003: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129-136 (2003)