Enforcing Trust Preferences in Mobile Person-to-Person Payments
暂无分享,去创建一个
[1] Mehmet A. Orgun,et al. Trust Transitivity in Complex Social Networks , 2011, AAAI.
[2] Said El Hajji,et al. Homomorphic Encryption Applied to the Cloud Computing Security , 2012 .
[3] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Brian King,et al. Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n) , 2009, Int. J. Netw. Secur..
[5] Brian King,et al. A Point Compression Method for Elliptic Curves Defined over GF(2 n) , 2004, Public Key Cryptography.
[6] Josep Domingo-Ferrer,et al. Privacy homomorphisms for social networks with private relationships , 2008, Comput. Networks.
[7] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[8] E. M. Mohamed,et al. Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[9] Panagiotis Papadimitratos,et al. Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.
[10] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[11] Dan Brickley,et al. FOAF Vocabulary Specification , 2004 .
[12] Barbara Carminati,et al. P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.
[13] J. Golbeck. Personalizing Applications through Integration of Inferred Trust Values in Semantic Web-Based Social Networks , 2005 .
[14] Josep Domingo-Ferrer. A Public-Key Protocol for Social Networks with Private Relationships , 2007, MDAI.
[15] Kamlesh Dutta,et al. A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment , 2010 .
[16] Steven D. Galbraith,et al. Point compression for Koblitz elliptic curves , 2011, Adv. Math. Commun..