1. Why we tag: motivations for annotation in mobile and online media;Ames,2007
2. Dynamic and efficient key management for access hierarchies;Atallah,2005
3. A privacy-preserving encrypted OSN with stateless server interaction: the Snake design;Barenghi;Comput Secur,2016
4. Evaluation of face recognition techniques for application to Facebook;Becker,2008
5. Ciphertext-policy attribute-based encryption;Bethencourt,2007