Privacy-Preserving Verifiable Proximity Test for Location-Based Services
暂无分享,去创建一个
Yuguang Fang | Qi Jia | Linke Guo | Ming Li | Gaoqiang Zhuo
[1] Ove Andersen,et al. A Location Privacy Aware Friend Locator , 2009, SSTD.
[2] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[3] Roberto Tamassia,et al. Authenticated hash tables , 2008, CCS.
[4] Yuval Ishai,et al. From Secrecy to Soundness: Efficient Verification via Secure Computation , 2010, ICALP.
[5] Yuguang Fang,et al. Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[6] Xiaodong Lin,et al. PLAM: A privacy-preserving framework for local-area mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Sushil Jajodia,et al. Privacy-Aware Proximity Based Services , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Yuguang Fang,et al. Privacy-preserving revocable content sharing in geosocial networks , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[11] Yuguang Fang,et al. Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[12] Man Lung Yiu,et al. Private and Flexible Proximity Detection in Mobile Social Networks , 2010, 2010 Eleventh International Conference on Mobile Data Management.
[13] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[14] Haojin Zhu,et al. Fairness-Aware and Privacy-Preserving Friend Matching Protocol in Mobile Social Networks , 2013, IEEE Transactions on Emerging Topics in Computing.
[15] Haojin Zhu,et al. All your location are belong to us: breaking mobile social networks for automated user location tracking , 2013, MobiHoc '14.
[16] D. Boneh,et al. Encryption schemes from bilinear maps , 2007 .
[17] Nicholas Hopper,et al. Efficient Private Proximity Testing with GSM Location Sketches , 2012, Financial Cryptography.
[18] Cong Wang,et al. Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.
[19] Guanhua Yan,et al. Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.
[20] Roberto Tamassia,et al. Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.
[21] Rosario Gennaro,et al. Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..
[22] Yao Zheng,et al. SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags , 2012, ESORICS.
[23] Yuguang Fang,et al. A game-theoretic approach for achieving k-anonymity in Location Based Services , 2013, 2013 Proceedings IEEE INFOCOM.
[24] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.