메뉴 건너뛰기




Volumn 5921 LNCS, Issue , 2009, Pages 236-251

A new protocol for the nearby friend problem

Author keywords

[No Author keywords available]

Indexed keywords

BASIC PROTOCOLS; COMMUNICATION BANDWIDTH; COMPUTATIONAL POWER; CRYPTOGRAPHIC PRIMITIVES; LOCATION INFORMATION; LOCATION PRIVACY; LOCATION-BASED SERVICES; NEW APPROACHES; NEW PROTOCOL; PRIVACY PRESERVING; SECURITY MODEL; SOCIAL NETWORKING; THIRD PARTIES;

EID: 72449202595     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-10868-6_14     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 26444476977 scopus 로고    scopus 로고
    • Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, 3570, pp. 341-356. Springer, Heidelberg (2005)
    • Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman assumptions with applications to password-based authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 341-356. Springer, Heidelberg (2005)
  • 2
    • 34548589075 scopus 로고    scopus 로고
    • Buddy tracking - efficient proximity detection among mobile friends. Pervasive and Mobile
    • Amir, A., Efrat, A., Myllymaki, J., Palaniappan, L., Wampler, K.: Buddy tracking - efficient proximity detection among mobile friends. Pervasive and Mobile Computing 3, 489-511 (2007)
    • (2007) Computing , vol.3 , pp. 489-511
    • Amir, A.1    Efrat, A.2    Myllymaki, J.3    Palaniappan, L.4    Wampler, K.5
  • 3
    • 0242496951 scopus 로고    scopus 로고
    • Secure multi-party computation problems and their applications: A review and open problems
    • Association for Computing Machinery, pp
    • Atallah, M., Du, W.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms - NSPW 2001. Association for Computing Machinery, pp. 13-22 (2001)
    • (2001) Proceedings of the 2001 Workshop on New Security Paradigms - NSPW , pp. 13-22
    • Atallah, M.1    Du, W.2
  • 4
    • 0142156713 scopus 로고    scopus 로고
    • Variations of Diffie-Hellman Problem
    • Qing, S, Gollmann, D, Zhou, J, eds, ICICS 2003, Springer, Heidelberg
    • Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman Problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301-312. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2836 , pp. 301-312
    • Bao, F.1    Deng, R.2    Zhu, H.3
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J, ed, CRYPTO 2001, Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 586-615. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 6
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boyd, C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 297-319. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2248 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 7
    • 84957375076 scopus 로고    scopus 로고
    • A secure and optimally efficient multiauthority election
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multiauthority election. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103-118. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 103-118
    • Cramer, R.1    Gennaro, R.2    Schoenmakers, B.3
  • 8
    • 72449178775 scopus 로고    scopus 로고
    • Dierks, T, Rescorla, E, The transport layer security (TLS)protocol, Technical report, Version 1.1 1483 RFC 4346, Internet Engineering Task Force 2006
    • Dierks, T., Rescorla, E.: The transport layer security (TLS)protocol, Technical report, Version 1.1 1483 RFC 4346, Internet Engineering Task Force (2006), http://www.ietf.org/rfc/rfc4346.txt
  • 10
    • 72449179199 scopus 로고    scopus 로고
    • FIPS 186-3, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)
    • FIPS 186-3, Digital Signature Standard (DSS), Federal Information Processing Standards Publication 186-3, National Institute of Standards and Technology (2009)
  • 11
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Freedman, M., Nissim, K., Pinkas, B.: Efficient private matching and set intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 12
    • 85050160774 scopus 로고    scopus 로고
    • Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: ACM Symposium on Theory of Computing - STOC 1982, Association for Computing Machinery, pp. 365-377 (1982)
    • Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: ACM Symposium on Theory of Computing - STOC 1982, Association for Computing Machinery, pp. 365-377 (1982)
  • 13
    • 70350337337 scopus 로고    scopus 로고
    • How to hash on elliptic curves
    • Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
    • Icart, T.: How to hash on elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 303-316. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5677 , pp. 303-316
    • Icart, T.1
  • 15
    • 84955606093 scopus 로고    scopus 로고
    • Proving without knowing: On oblivious, agnostic and blindfolded provers
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Jakobsson, M., Yung, M.: Proving without knowing: On oblivious, agnostic and blindfolded provers. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 186-200. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 186-200
    • Jakobsson, M.1    Yung, M.2
  • 16
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-preserving set operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 17
    • 33746101482 scopus 로고    scopus 로고
    • Køien, G., Oleshchuk, V.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, 3856, pp. 40-58. Springer, Heidelberg (2006)
    • Køien, G., Oleshchuk, V.: Location privacy for cellular systems; analysis and solution. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 40-58. Springer, Heidelberg (2006)
  • 18
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • Fumy, W, ed, EUROCRYPT 1997, Springer, Heidelberg
    • Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 19
    • 33750057671 scopus 로고    scopus 로고
    • Szydlo, M.: A note on chosen-basis decisional Diffie-Hellman Assumptions. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 166-170. Springer, Heidelberg (2006)
    • Szydlo, M.: A note on chosen-basis decisional Diffie-Hellman Assumptions. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 166-170. Springer, Heidelberg (2006)
  • 22
    • 38149079700 scopus 로고    scopus 로고
    • Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 62-76. Springer, Heidelberg (2007)
    • Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.