共 12 条
[1]
[Anonymous], 2008, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08
[2]
Balduzzi M, 2010, LECT NOTES COMPUT SC, V6307, P422, DOI 10.1007/978-3-642-15512-3_22
[3]
Irani Danesh, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P271, DOI 10.1109/CSE.2009.459
[4]
Johnson C, 2006, INTERSECTIONS-GENDER
[6]
Lenhart A., 2009, Adults and social network websites
[7]
Robust de-anonymization of large sparse datasets
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:111-125
[8]
De-anonymizing Social Networks
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:173-187
[9]
It's no secret Measuring the security and reliability of authentication via 'secret' questions
[J].
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2009,
:375-390
[10]
Sweeney Latanya, 2000, LIDAPWP4 CARN MELL U