PRISM: PRivacy-Aware Interest Sharing and Matching in Mobile Social Networks
暂无分享,去创建一个
[1] Feng Xia,et al. Safety Challenges and Solutions in Mobile Social Networks , 2013, IEEE Systems Journal.
[2] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[3] Qi Xie,et al. Privacy-preserving matchmaking For mobile social networking secure against malicious users , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[4] Justin Manweiler,et al. SMILE: encounter-based trust for mobile social services , 2009, CCS.
[5] Feng Xia,et al. Event-Based Mobile Social Networks: Services, Technologies, and Applications , 2014, IEEE Access.
[6] Landon P. Cox,et al. SmokeScreen: flexible privacy controls for presence-sharing , 2007, MobiSys '07.
[7] Heekuck Oh,et al. A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks , 2014, WISA.
[8] George Varghese,et al. MobiClique: middleware for mobile social networking , 2009, WOSN '09.
[9] Jesper Kjeldskov,et al. Just-for-us: a context-aware mobile information system facilitating sociality , 2005, Mobile HCI.
[10] Yong Wang,et al. Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[11] William G. Griswold,et al. Peopletones: a system for the detection and notification of buddy proximity on mobile phones , 2008, MobiSys '08.
[12] Yong Wang,et al. Efficient privacy preserving matchmaking for mobile social networking , 2015, Concurr. Comput. Pract. Exp..
[13] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[14] Dusit Niyato,et al. Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.
[15] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[16] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.