Introduction and Preliminaries
暂无分享,去创建一个
Subhamoy Maitra | Suprita Talnikar | Mridul Nandi | Pranab Chakraborty | S. Maitra | Pranab Chakraborty | M. Nandi | Suprita Talnikar
[1] Xiaohui Liang,et al. EPIC: Efficient Privacy-Preserving Contact Tracing for Infection Detection , 2018, 2018 IEEE International Conference on Communications (ICC).
[2] Guanhua Yan,et al. Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.
[3] Qiang Tang,et al. Privacy-Preserving Contact Tracing: current solutions and open questions , 2020, IACR Cryptol. ePrint Arch..
[4] Yaron Gvili,et al. Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc , 2020, IACR Cryptol. ePrint Arch..
[5] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[6] Nigel P. Smart,et al. Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .
[7] Ronald L. Rivest,et al. Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..
[8] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[9] Ran Canetti,et al. Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus , 2020, 2003.13670.
[10] Eric Horvitz,et al. PACT: Privacy-Sensitive Protocols And Mechanisms for Mobile Contact Tracing , 2020, IEEE Data Eng. Bull..
[11] Helena Handschuh. SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm) , 2011, Encyclopedia of Cryptography and Security.
[12] P. Vollmar,et al. Virological assessment of hospitalized patients with COVID-2019 , 2020, Nature.
[13] Hyunghoon Cho,et al. Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs , 2020, ArXiv.
[14] Fred Brauer,et al. Compartmental Models in Epidemiology , 2008, Mathematical Epidemiology.
[15] R. Emonet,et al. Epidemic Contact Tracing via Communication Traces , 2014, PloS one.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] John Black,et al. CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions , 2000, CRYPTO.
[18] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.
[19] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[20] Alfred Menezes,et al. Elliptic Curve Cryptography , 2005, Encyclopedia of Cryptography and Security.
[21] Camel Tanougast,et al. Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG , 2017, Secur. Commun. Networks.
[22] Robert Davidson,et al. Getting Started with Bluetooth Low Energy , 2014 .
[23] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.