SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud
暂无分享,去创建一个
Xiaohui Liang | Mengyuan Li | Le Yu | Haojin Zhu | Na Ruan | Qiyang Qian | Xiaohui Liang | Haojin Zhu | Mengyuan Li | Na Ruan | Qiyang Qian | Le Yu
[1] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[2] Shaojie Tang,et al. Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation , 2013, 2013 Proceedings IEEE INFOCOM.
[3] Pan Li,et al. Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[4] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[5] Guanhua Yan,et al. Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.
[6] Mihir Bellare,et al. Deterministic and Efficiently Searchable Encryption , 2007, CRYPTO.
[7] Rui Zhang,et al. Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications , 2016, IEEE Internet of Things Journal.
[8] Xiaohui Liang,et al. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..
[9] Laurence T. Yang,et al. Multicloud-Based Evacuation Services for Emergency Management , 2014, IEEE Cloud Computing.
[10] Dan Boneh,et al. Location Privacy via Private Proximity Testing , 2011, NDSS.
[11] Mianxiong Dong,et al. NetSecCC: A scalable and fault-tolerant architecture for cloud computing security , 2016, Peer-to-Peer Netw. Appl..
[12] Salve Bhagyashri Salve Bhagyashri,et al. Privacy-Preserving Public Auditing For Secure Cloud Storage , 2014 .
[13] Huaxiong Wang,et al. Distributed Private Matching and Set Operations , 2008, ISPEC.
[14] Serge Fehr,et al. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles , 2008, CRYPTO.
[15] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[16] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[17] Carmela Troncoso,et al. Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.
[18] G. Loewenstein,et al. Privacy and human behavior in the age of information , 2015, Science.
[19] Rui Zhang,et al. Privacy-preserving spatiotemporal matching , 2013, 2013 Proceedings IEEE INFOCOM.
[20] Brian,et al. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008 .
[21] Guanhua Yan,et al. Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.
[22] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[23] Xiaohui Liang,et al. HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks , 2012, Comput. Commun..
[24] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[25] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[26] Ramakrishnan Srikant,et al. Privacy-preserving data mining , 2000, SIGMOD '00.