메뉴 건너뛰기




Volumn , Issue , 2009, Pages 246-255

SMILE: Encounter-based trust for mobile social services

Author keywords

Location based services; Privacy; Social networking; Trust

Indexed keywords

CENTRALIZED SERVER; CRYPTOGRAPHIC PRIMITIVES; DATA CONFIDENTIALITY; LOCATION INFORMATION; LOCATION-BASED SERVICES; PRIVACY PRESERVING; PROTOCOL ANALYSIS; PROTOTYPE IMPLEMENTATIONS; SERVICE PROVIDER; SHORT-RANGE WIRELESS COMMUNICATIONS; SOCIAL NETWORKING; SOCIAL RELATIONSHIPS; SOCIAL SCENARIOS; SOCIAL SERVICE;

EID: 74049135283     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653692     Document Type: Conference Paper
Times cited : (112)

References (30)
  • 4
    • 35448936042 scopus 로고    scopus 로고
    • Smokescreen: Flexible privacy controls for presence-sharing
    • L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In MobiSys, 2007.
    • (2007) MobiSys
    • Cox, L.P.1    Dalton, A.2    Marupadi, V.3
  • 6
    • 19944388571 scopus 로고    scopus 로고
    • Social serendipity: Mobilizing social software
    • N. Eagle and A. Pentland. Social serendipity: Mobilizing social software. IEEE Pervasive Computing, 4(2):28-34, 2005.
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.2 , pp. 28-34
    • Eagle, N.1    Pentland, A.2
  • 9
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys, 2003.
    • (2003) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 10
    • 74049149229 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless lan through disposable interface identifiers: A quantitative analysis. ACM MONET, 2005.
    • (2005) ACM MONET
    • Gruteser, M.1    Grunwald, D.2
  • 13
    • 70450242725 scopus 로고    scopus 로고
    • On the effectiveness of secret key extraction from wireless signal strength in real environments
    • S. Jana, S. N. Premnath, M. Clark, S. K. Kasera, N. Patwari, and S. V. Krishnamurthy. On the effectiveness of secret key extraction from wireless signal strength in real environments. In Mobicom, 2009.
    • (2009) Mobicom
    • Jana, S.1    Premnath, S.N.2    Clark, M.3    Kasera, S.K.4    Patwari, N.5    Krishnamurthy, S.V.6
  • 14
    • 35449007284 scopus 로고    scopus 로고
    • Preserving location privacy in wireless lans
    • June
    • T. Jiang, H. J. Wang, and Y.-C. Hu. Preserving location privacy in wireless lans. In MobiSys, June 2007.
    • (2007) MobiSys
    • Jiang, T.1    Wang, H.J.2    Hu, Y.-C.3
  • 15
    • 74049160193 scopus 로고    scopus 로고
    • John Leyden. Teen hack suspects charged over myspace extortion bid, May 2006. The Register.
    • John Leyden. Teen hack suspects charged over myspace extortion bid, May 2006. The Register.
  • 16
  • 17
    • 85094322146 scopus 로고    scopus 로고
    • Information slicing: Anonymity using unreliable overlays
    • April
    • S. Katti, J. Cohen, and D. Katabi. Information slicing: Anonymity using unreliable overlays. In NSDI, April 2007.
    • (2007) NSDI
    • Katti, S.1    Cohen, J.2    Katabi, D.3
  • 18
    • 59249084348 scopus 로고    scopus 로고
    • Location-based trust for mobile user-generated content: Applications, challenges and implementations
    • February
    • V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi. Location-based trust for mobile user-generated content: applications, challenges and implementations. In HotMobile, February 2008.
    • (2008) HotMobile
    • Lenders, V.1    Koukoumidis, E.2    Zhang, P.3    Martonosi, M.4
  • 20
    • 74049106426 scopus 로고    scopus 로고
    • Loopt, Inc. Your social compass | loopt. http://www.loopt.com.
    • Loopt, Inc. Your social compass | loopt. http://www.loopt.com.
  • 21
    • 74049094177 scopus 로고    scopus 로고
    • Story and Brad Stone. Facebook retreats on online tracking
    • November
    • Louise Story and Brad Stone. Facebook retreats on online tracking, November 2007. The New York Times.
    • (2007) The New York Times
    • Louise1
  • 22
    • 67650652709 scopus 로고    scopus 로고
    • We saw each other on the subway: Secure, anonymous proximity-based missed connections
    • J. Manweiler, R. Scudellari, Z. Cancio, and L. P. Cox. We saw each other on the subway: secure, anonymous proximity-based missed connections. In HotMobile, 2009.
    • (2009) HotMobile
    • Manweiler, J.1    Scudellari, R.2    Cancio, Z.3    Cox, L.P.4
  • 23
  • 24
    • 60149097098 scopus 로고    scopus 로고
    • Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
    • S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Mobicom, 2008.
    • (2008) Mobicom
    • Mathur, S.1    Trappe, W.2    Mandayam, N.3    Ye, C.4    Reznik, A.5
  • 25
    • 74049120600 scopus 로고    scopus 로고
    • employees break into your profile, November
    • Megan McCarthy. How Facebook employees break into your profile, November 2007. http://www.valleywag.com.
    • (2007) How Facebook
    • McCarthy, M.1
  • 27
    • 74049127756 scopus 로고    scopus 로고
    • U. Moller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster protocol, version 2. IETF Internet Draft, 2003
    • U. Moller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster protocol - version 2. IETF Internet Draft, 2003.
  • 29
    • 79551689384 scopus 로고    scopus 로고
    • Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs
    • T. Ristenpart, G. Maganis, A. Krishnamurthy, and T. Kohno. Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs. In USENIX Security, 2008.
    • (2008) USENIX Security
    • Ristenpart, T.1    Maganis, G.2    Krishnamurthy, A.3    Kohno, T.4
  • 30
    • 67650661394 scopus 로고    scopus 로고
    • Enabling new mobile applications with location proofs
    • S. Saroiu and A. Wolman. Enabling new mobile applications with location proofs. In HotMobile, 2009.
    • (2009) HotMobile
    • Saroiu, S.1    Wolman, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.