暂无分享,去创建一个
Ben Niu | Zongqing Lu | Hui Li | Xiaoyan Zhu | Tanran Zhang
[1] Justin Manweiler,et al. We saw each other on the subway: secure, anonymous proximity-based missed connections , 2009, HotMobile '09.
[2] Guanhua Yan,et al. Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.
[3] Ranveer Chandra,et al. Empowering developers to estimate app energy consumption , 2012, Mobicom '12.
[4] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..
[5] Xiaohui Liang,et al. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..
[6] Dong Xuan,et al. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[7] Emiliano De Cristofaro,et al. (If) Size Matters: Size-Hiding Private Set Intersection , 2011, IACR Cryptol. ePrint Arch..
[8] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[9] A. H. Lipkus. A proof of the triangle inequality for the Tanimoto distance , 1999 .
[10] George Varghese,et al. MobiClique: middleware for mobile social networking , 2009, WOSN '09.
[11] Emiliano De Cristofaro,et al. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model , 2010, ASIACRYPT.
[12] Anthony Vetro,et al. Privacy-preserving approximation of L1 distance for multimedia applications , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[13] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[14] Justin Manweiler,et al. SMILE: encounter-based trust for mobile social services , 2009, CCS.
[15] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[16] Roger Wattenhofer,et al. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[17] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[18] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.