R. Assam, M. Hassani, M. Brysch, and T. Seidl, “(k, d)-core
anonymity: Structural anonymization of massive net-
works,” in Proceedings of the 26th International Con-
ference on Scientific and Statistical Database Manage-
ment, ser. SSDBM 2014.
J. Cheng, A. W. Fu, and J. Liu, “K-isomorphism: Privacy
preserving network publication against structural at-
tacks,” 2010.
J. H. Cheon, A. Kim, M. Kim, and Y. S. Song, “Homomor-
phic encryption for arithmetic of approximate num-
bers,” in ASIACRYPT 2017, ser. LNCS, vol. 10624,
2017, pp. 409–437.
A. Bulu¸c, J. T. Fineman, M. Frigo, J. R. Gilbert, and
C. E. Leiserson, “Parallel sparse matrixvector and
matrix-transpose-vector multiplication using com-
pressed sparse blocks,” in Proc. SPAA 2009. ACM,
2009, pp. 233–244.
X. Jiang, M. Kim, K. E. Lauter, and Y. Song, “Secure out-
sourced matrix computation and application to neural
networks,” in Proc. ACM CCS 2018. ACM, 2018, pp.
1209–1222.
X. Zhu and Z. Ghahramani, “Learning from labeled
and unlabeled data with label propagation,” 2003.
[Online]. Available: http://mlg.eng.cam.ac.uk/zoubin/
papers/CMU-CALD-02-107.pdf
V. Mallawaarachchi, “Label propagation demystified.”
2020. [Online]. Available: https://towardsdatascience.
com/label-propagation-demystified-cd5390f27472
L. Zhukov, “Structural analysis and visualization of
networks course, hse.” 2015. [Online]. Available:
http://www.leonidzhukov.net/hse/2015/networks/
lectures/lecture17.pdf
S. B. Seidman, “Network structure and minimum degree,”
Social networks, vol. 5, no. 3, pp.269–287, 1983.
P. Holme, “Core-periphery organization of complex net-
works,” Physical Review E, vol. 72, no. 4, p. 046111,
2005.
M. P. Rombach, M. A. Porter, J. H. Fowler, and P. J. Mucha,
“Core-periphery structure in networks,” SIAM Jour-
nal on Applied mathematics, vol. 74, no. 1, pp.
167–190, 2014.
V. Batagelj and M. Zaversnik, “An o(m) algorithm
for cores decomposition of networks,” CoRR, vol.
cs.DS/0310049, 2003.
J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu, “Efficient core
decomposition in massive networks,” in Proc. IEEE
ICDE 2011. IEEE, 2011, pp. 51–62.
W. Khaouid, M. Barsky, V. Srinivasan, and A. Thomo, “K-
core decomposition of large networks on a single pc,”
Proceedings of the VLDB Endowment, vol. 9, no. 1,
pp. 13–23, 2015.
A. Sala, X. Zhao, C. Wilson, H. Zheng, and B. Y. Zhao,
“Sharing graphs using differentially private graph
models,” 2011.
S. Ji, P. Mittal, and R. Beyah, “Graph data anonymization,
de-anonymization attacks, and de-anonymizability
quantification: A survey,” IEEE Communications Sur-
veys Tutorials, 2017.
S. Ji, W. Li, P. Mittal, X. Hu, and R. Beyah, “Secgraph: A
uniform and open-source evaluation system for graph
data anonymization and de-anonymization.” USENIX
Association, 2015.
M. Chase and S. Kamara, “Structured encryption and con-
trolled disclosure,” in Proc. ASIACRYPT 2010, ser.
LNCS, vol. 6477. Springer, 2010, pp. 577–594.
X. Meng, S. Kamara, K. Nissim, and G. Kollios, “GRECS:
graph encryption for approximate shortest distance
queries,” in Proc. 22nd ACM CCS Conference. ACM,
2015, pp. 504–517.
Q. Wang, K. Ren, M. Du, Q. Li, and A. Mohaisen, “Secgdb:
Graph encryption for exact shortest distance queries
with efficient updates,” in Financial Cryptography and
Data Security - 21st International Conference, FC
2017, ser. LNCS, vol. 10322. Springer, 2017, pp.
79–97.
C. Zhang, L. Zhu, C. Xu, K. Sharif, C. Zhang, and X. Liu,
“Pgas: Privacy-preserving graph encryption for accu-
rate constrained shortest distance queries,” Informa-
tion Sciences, vol. 506, pp. 325 – 345, 2020
S. Halevi, “Homomorphic encryption,” in Tutorials on the
Foundations of Cryptography. Springer International
Publishing, 2017, pp. 219–276.
G. Zyskind, O. Nathan, A. Pentland, “Enigma: Decen-
tralized Computation Platform with Guaranteed Pri-
vacy,” 2015, [Online] Available: https://www.enigma.
co/enigma full.pdf.
L. Aslett, P. Esperanca, C. Holmes “A review of homomor-
phic encryption and software tools for encrypted sta-
tistical machine learning,” 2015. [Online] Available:
https://arxiv.org/pdf/1508.06574.pdf.
M. Newman, “Networks: An Introduction,” USA: Oxford
University Press, 2010.
A. L
´
opez-Alt, E. Tromer, V. Vaikuntanathan. On-the-fly
multiparty computation on the cloud via multikey
fully homomorphic encryption. In Proceedings of the
44thannual ACM symposium on Theory of comput-
ing, pages 1219–1234. ACM, 2012.
A. Salau, R. Dantu, and K. Upadhyay ”Mining and Chain-
ing Fakeness, ” 8th Annual Hot Topics in the Science
of Security, Virtual Conference, Hosted by National
Security Agency, April 13-15, 2021.
A. Salau, R. Dantu, “Data Cooperatives for Neighbor-
hood Watch,” IEEE International Conference on
Blockchain and Cryptocurrency, Pages 1-8, Virtual
Conference, May 3-6, 2021
Investing Data with Untrusted Parties using HE
853