Author:
Moualkia Yamina,Amad Mourad,Baadache Abderrahmane
Reference30 articles.
1. Chen, Yifei, Li, Meng, Zheng, Shuli, et al., 2020. One-time, oblivious, and unlinkable query processing over encrypted data on cloud. In: International Conference on Information and Communications Security. Springer, Cham, pp. 350–365
2. Kokuryo, Jiro, Walsh, Toby, Maracke, Catharina, 2020. AI for Everyone: benefitting from and building trust in the technology. Lulu. com
3. Buchegger, S., Schiöberg, D., Vu, L.H., Datta, A., 2009. Socialcdn: PeerSoN: P2P social networking: early experiences and insights. In: Proc. the Second ACM EuroSys Workshop on Social Network Systems, ACM, pp. 46–52
4. Cutillo, L.A., Molva, R., Strufe, T., 2009. Safebook: feasibility of transitive cooperation for privacy on a decentralized social network. In: Proc. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks WoWMoM 2009, IEEE, pp. 1–6
5. Chowdhury, Shihabur Rahman, Roy, Arup Raton, Shaikh, Maheen, et al., 2015. A taxonomy of decentralized online social networks. Peer-to-Peer Network. Appl. 8 (3), 367–383
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献