SPICE: Secure Proximity-based Infrastructure for Close Encounters
暂无分享,去创建一个
[1] Ling Liu,et al. What Where Wi: An Analysis of Millions of Wi-Fi Access Points , 2007, 2007 IEEE International Conference on Portable Information Devices.
[2] Andrew T. Campbell,et al. Techniques for Improving Opportunistic Sensor Networking Performance , 2008, DCOSS.
[3] Guohong Cao,et al. APPLAUS: A Privacy-Preserving Location Proof Updating System for location-based services , 2011, 2011 Proceedings IEEE INFOCOM.
[4] Panayiotis Andreou,et al. Multi-objective Query Optimization in Smartphone Social Networks , 2011, 2011 IEEE 12th International Conference on Mobile Data Management.
[5] Y. Li,et al. A Wireless Sensor , AdHoc and Delay Tolerant Network System for Disaster Response , 2011 .
[6] Urs Hengartner,et al. VeriPlace: a privacy-aware location proof architecture , 2010, GIS '10.
[7] Andreas Achtzehn,et al. Survey of IEEE 802.11 Wi-Fi deployments for deriving the spatial structure of opportunistic networks , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).
[8] Aziz Mohaisen,et al. Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs , 2013, IEEE Transactions on Dependable and Secure Computing.
[9] Urs Hengartner,et al. Proving your location without giving up your privacy , 2010, HotMobile '10.
[10] Alec Wolman,et al. Enabling new mobile applications with location proofs , 2009, HotMobile '09.
[11] Thomas Ludwig,et al. CrowdMonitor: Mobile Crowd Sensing for Assessing Physical and Digital Activities of Citizens during Emergencies , 2015, CHI.
[12] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[13] L. Ertaul,et al. Private Proximity Testing For Location Based Services , 2013 .
[14] Justin Manweiler,et al. SMILE: encounter-based trust for mobile social services , 2009, CCS.
[15] Sameer Patil,et al. "Check out where I am!": location-sharing motivations, preferences, and practices , 2012, CHI Extended Abstracts.
[16] Xia Wang,et al. Connecting People at a Conference: A Study of Influence between Offline and Online Using a Mobile Social Application , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[17] Jean-Pierre Hubaux,et al. Secure and private proofs for location-based activity summaries in urban areas , 2014, UbiComp.
[18] Hongxia Jin,et al. Private proximity testing with an untrusted server , 2013, WiSec '13.
[19] C. Caini,et al. DTN meets smartphones: Future prospects and tests , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.