Efficient privacy preserving matchmaking for mobile social networking
暂无分享,去创建一个
Yong Wang | Hong-Zong Li | Yun Xia | Jie Hou | Hong-Zong Li | Jie Hou | Yong Wang | Yun Xia
[1] Dong Xuan,et al. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[2] Xiaomin Liu,et al. Fast Secure Computation of Set Intersection , 2010, SCN.
[3] Emiliano De Cristofaro,et al. (If) Size Matters: Size-Hiding Private Set Intersection , 2011, IACR Cryptol. ePrint Arch..
[4] Alexandre V. Evfimievski,et al. Information sharing across private databases , 2003, SIGMOD '03.
[5] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[6] Emiliano De Cristofaro,et al. Privacy-Preserving Policy-Based Information Transfer , 2009, Privacy Enhancing Technologies.
[7] Roger Wattenhofer,et al. VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[8] C. Pandu Rangan,et al. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security , 2009, CANS.
[9] Susan Hohenberger,et al. Honest-Verifier Private Disjointness Testing Without Random Oracles , 2006, Privacy Enhancing Technologies.
[10] Jesper Kjeldskov,et al. Just-for-us: a context-aware mobile information system facilitating sociality , 2005, Mobile HCI.
[11] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[12] Qi Xie,et al. Privacy-preserving matchmaking For mobile social networking secure against malicious users , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[13] Yong Wang,et al. Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious Users , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Benny Pinkas,et al. Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.
[15] Chris Clifton,et al. Secure set intersection cardinality with application to association rule mining , 2005, J. Comput. Secur..
[16] Emiliano De Cristofaro,et al. Fast and Private Computation of Cardinality of Set Intersection and Union , 2012, CANS.
[17] William G. Griswold,et al. Peopletones: a system for the detection and notification of buddy proximity on mobile phones , 2008, MobiSys '08.
[18] Jan Camenisch,et al. Private Intersection of Certified Sets , 2009, Financial Cryptography.
[19] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[20] Emiliano De Cristofaro,et al. Fast and Private Computation of Set Intersection Cardinality , 2011, IACR Cryptol. ePrint Arch..
[21] Alex Pentland,et al. Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.
[22] Adi Shamir,et al. How to share a secret , 1979, CACM.
[23] Qi Xie. Privacy-Preserving Interest Matching for Mobile Social Networking , 2010 .
[24] Li Shundong,et al. Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations , 2008 .
[25] Emiliano De Cristofaro,et al. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model , 2010, ASIACRYPT.
[26] ShundongLi,et al. Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations , 2008 .
[27] Ron Steinfeld,et al. Efficient Fuzzy Matching and Intersection on Private Datasets , 2009, ICISC.
[28] Xiaohui Liang,et al. Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network , 2010, BODYNETS.
[29] Carmit Hazay,et al. Efficient Set Operations in the Presence of Malicious Adversaries , 2010, Journal of Cryptology.
[30] Elaine Shi,et al. Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies , 2012, Public Key Cryptography.
[31] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[32] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[33] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[34] Emiliano De Cristofaro,et al. Reclaiming privacy for smartphone applications , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[35] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.