Login / Signup

Identifying hidden social circles for advanced privacy configuration.

Anna Cinzia SquicciariniSushama KarumanchiDan LinNicole DeSisto
Published in: Comput. Secur. (2014)
Keyphrases