Privacy-Preserving Distributed Profile Matching in Proximity-Based Mobile Social Networks
暂无分享,去创建一个
Ming Li | Wenjing Lou | Ning Cao | Shucheng Yu | Shucheng Yu | W. Lou | N. Cao | Ming Li
[1] Dong Xuan,et al. E-SmallTalker: A Distributed Mobile System for Social Networking in Physical Proximity , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[2] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[3] Benny Pinkas,et al. Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.
[4] Emiliano De Cristofaro,et al. Private Discovery of Common Social Contacts , 2011, ACNS.
[5] Yuguang Fang,et al. C4: A new paradigm for providing incentives in multi-hop wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[6] Emiliano De Cristofaro,et al. Private discovery of common social contacts , 2011, International Journal of Information Security.
[7] Yin Zhang,et al. Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[8] Radu Sion,et al. A personal mobile DRM manager for smartphones , 2009, Comput. Secur..
[9] Emiliano De Cristofaro,et al. Reclaiming privacy for smartphone applications , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[10] Xiaohui Liang,et al. A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..
[11] Yehuda Lindell,et al. Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries , 2008, Journal of Cryptology.
[12] Huaxiong Wang,et al. Distributed Private Matching and Set Operations , 2008, ISPEC.
[13] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[14] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[15] Ulrich Herberg. 在事件層平行方法下 NS2 網路模擬器的效能量測 , 2006 .
[16] Emiliano De Cristofaro,et al. Practical Private Set Intersection Protocols with Linear Complexity , 2010, Financial Cryptography.
[17] Dawn Xiaodong Song,et al. Privacy-Preserving Set Operations , 2005, CRYPTO.
[18] Yantian Hou,et al. Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel , 2013, WiSec '13.
[19] Moti Yung,et al. Efficient robust private set intersection , 2009, Int. J. Appl. Cryptogr..
[20] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[21] Ming Li,et al. Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.
[22] Kannan Balasubramanian,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.
[23] Emiliano De Cristofaro,et al. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model , 2010, ASIACRYPT.
[24] Yehuda Lindell,et al. A Full Proof of the BGW Protocol for Perfectly Secure Multiparty Computation , 2015, Journal of Cryptology.
[25] Xiaomin Liu,et al. Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.
[26] K. Santhi,et al. Privacy-Preserving Distributed Profile Matching in Proximity-based Mobile Social Networks , 2015 .
[27] Eike Kiltz,et al. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..
[28] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[29] Mikhail J. Atallah,et al. Efficient Privacy-Preserving k-Nearest Neighbor Search , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[30] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[31] Adi Shamir,et al. How to share a secret , 1979, CACM.
[32] C. Pandu Rangan,et al. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security , 2009, CANS.
[33] Dina Katabi,et al. Secure In-Band Wireless Pairing , 2011, USENIX Security Symposium.
[34] Ahmad Rahmati,et al. Context-for-wireless: context-sensitive energy-efficient wireless data transfer , 2007, MobiSys '07.
[35] Ming Li,et al. FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.
[36] Kazuo Ohta,et al. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol , 2007, Public Key Cryptography.