[1] Buchheit, Paul, Alemon M. Martinez, Social Network Services, in Wikipedia
[online] https://en.wikipedia.org/wiki/Social_networking_service. [2] BogdanCarbunar, MahmudurRahman, Jaime Ballesteros, PROFILR: Toward Preserving Privacy and Functionality in Geosocial Networks in IEEE TRANS., VOL. 9, NO. 4, APRIL 2014 [3] D. Chaum, Blind signatures for untraceable payments, in Proc. Adv.Cryptol. CRYPTO, 1982. [4] B. Krishnamurthy and C. E. Wills,On the leakage of personally identifiable information via online social networks in Comput. Commun, 2010. [5] R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The secondgeneration onion router, in Proc. USENIX Security Symp., 2004. [6] DrPhilippa Collin, Dr. Kitty Rahilly,Dr. Ingrid Richardson, Dr. Amanda Third, The Benefits of Social Networking Services in Research at Cooperative Research Centre for Young People,April 2011. [7] J. Ballesteros, B. Carbunar, M. Rahman, N. Rishe, and S. S. Iyengar, Towards safe cities: A mobile and social networking approach, IEEETrans. Parallel Distrib. Syst., 2013. [8] M.Sumalatha, J.BalaMuraliKrishna,Preserving Privacy and Ensuring Efficient Functionality with Profile in Geosocial Networks in International Journal of Computer Trends and Technology (IJCTT) Volume 21 Number 2 Mar 2015 [9] B. Carbunar, M. Rahman, J. Ballesteros, and N. Rishe, Private location centric profiles for geosocial networks, in Proc. 20th ACM SIGSPATIALInt. Conf. Adv. Geograph. Inf. Syst. (GIS), 2012. [10] J. Benaloh, Dense probabilistic encryption, in Proc. Workshop Sel. Areas, in 2014. [11] B. Carbunar and R. Potharaju, You unlocked the Mt. Everest badge on foursquare! countering location fraud in geosocial networks, in Proc.9th IEEE Int. Conf. Mobile Ad Hoc Sensor Syst. (MASS), Feb. 2012. [12] Monika Chilluru,B. RavindraNaick,P. Nirupama,"VCPROFILE: A Novel Framework for Privacy Preserving in Geosocial Networks" in International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 11, November 2014. [13] R. Dingledine, N. Mathewson, and P. F. Syverson, Tor: The secondgeneration onion router, in Proc. USENIX Security Symp., 2004. [14] S. Goldwasser, S. Micali, and C. Rackoff, The knowledge complexity of interactive proof systems, SIAM J. Comput, 1989. [15] M. Jakobsson and A. Juels, Mix and match: Secure function evaluation via ciphertexts, in Proc. Adv. Cryptol. 6th Int. Conf. Theory Appl.Cryptol. Inf. Security, 2000. [16] J. Ballesteros, B. Carbunar, M. Rahman, N. Rishe, and S. S. Iyengar, Towards safe cities: A mobile and social networking approach, IEEE Trans. Parallel Distrib. Syst., Nov. 2013. [17] B. Carbunar, M. Rahman, J. Ballesteros, and N. Rishe, Private location centric profiles for geosocial networks, in Proc. 20th ACM SIGSPATIALInt. Conf. Adv. Geograph. Inf. Syst. (GIS), 2012. [18] M. Rahman, J. Ballesteros, B. Carbunar, N. Rishe, and A. V. Vasilakos, Toward preserving privacy and functionality in geosocial networks, in Proc. 18th Int. Conf. Mobile Comput. Netw., 2013. [19] M. Gruteser and D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in Proc. MobiSys, 2003. [20] B. Hoh, M. Gruteser, R. Herring, J. Ban, D. Work, J.-C. Herrera, et al., Virtual trip lines for distributed privacy-preserving traffic monitoring, in Proc. ACM MobiSys, 2008. [21] F. G. Olumofin, P. K. Tysowski, I. Goldberg, and U. Hengartner, Achieving efficient query privacy for location based services, in Proc.Privacy Enhancing Technol., 2010. [22] X. Pan, X. Meng, and J. Xu, Distortion-based anonymity for continuous queries in location-based mobile services, in Proc. GIS, 2009. [23] A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, L- diversity: Privacy beyond k-anonymity, in Proc. 22nd Int. Conf.Data Eng. (ICDE), 2006. [24] K. P. N. Puttaswamy and B. Y. Zhao, Preserving privacy in locationbased mobile social applications, in Proc. 11th Workshop MobileComput. Syst. Appl., New York, NY, USA, 2010. [25] S. Mascetti, D. Freni, C. Bettini, X. Sean Wang, and S. Jajodia, Privacy in geo- social networks: Proximity notification with untrusted service providers and curious buddies, VLDB J., Aug. 2011. [26] Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti, "Preserving Location and Absence Privacy in Geo-Social Networks" in CIKM10, Toronto, Ontario, Canada, October 2630, 2010. [27] Shaft Goldwasser, Silvio Micali,"Probabilistic Encryption & How To Play Mental Poker Keeping Secret All Partial Information" in Computer Science Department University of California - Berkeley [Research] ConsiglioNazionaledelleRicerche - Italy and in part by NSF Grant MCS-79-037667. [28] Masayuki Abe, Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-servers" in NTT LaboratoriesNippon Telegraph and Telephone Corporation [Research], 2013. [29] Gang Wang, Tristan Konolige, Chri [30] sto Wilson, XiaoWang, HaitaoZheng and Ben Y. Zhao,"You are How You Click: Clickstream Analysis for Sybil Detection" in UC Santa Barbara Research Northeastern University Renren Inc., 2011. [31] Grady Booch, James Rumbaugh, Ivar Jacobson, "Unified Modeling Language User Guide" in Publisher: Addison Wesley First Edition October 20, 1998ISBN: 0- 201-57168-4, 512 pages
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux