Please use this identifier to cite or link to this item:
http://dspace.iitrpr.ac.in:8080/xmlui/handle/123456789/459
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kukkala, V.B. | - |
dc.contributor.author | Iyengar, S.R.S | - |
dc.contributor.author | Saini, J.S. | - |
dc.date.accessioned | 2016-11-18T11:49:23Z | - |
dc.date.available | 2016-11-18T11:49:23Z | - |
dc.date.issued | 2016-11-18 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/459 | - |
dc.description.abstract | The recent explosion of online networked data and the discovery of universal topological characteristics in real world networks has led to the emergence of a new domain of research, namely, social networks. However, much research in this domain remains unexplored due to the inaccessibility of data of sensitive networks, which include hate networks, trust networks and sexual relationship networks. This paper proposes a secure multiparty protocol which allows a set of parties to compute the underlying network on them. The proposed protocol is information theoretically secure, and its security is further enhanced by a list of security tests, which includes k-Anonymity test, check for self loops and weighted edges. Although some solutions have been proposed for this problem earlier, the practicality of each one of those is questionable. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Anonymization | en_US |
dc.subject | Multiparty computation | en_US |
dc.subject | Social networks | en_US |
dc.title | Secure multiparty graph computation | en_US |
dc.type | Article | en_US |
Appears in Collections: | Year-2016 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Full Text.pdf | 163.62 kB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.