메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A privacy-preserving scheme for online social networks with efficient revocation

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS RIGHTS; DATA SHARING; DYNAMIC CHANGES; ENCRYPTED DATA; FACEBOOK; FUNCTIONAL REQUIREMENT; GROUP MEMBERSHIPS; PERSONAL INFORMATION; PRIVACY PRESERVING; PRIVATE DATA; SECURITY REQUIREMENTS; SHARED INFORMATION; SOCIAL GROUPS; SOCIAL NETWORKS;

EID: 77953298166     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462080     Document Type: Conference Paper
Times cited : (64)

References (27)
  • 4
    • 52049126397 scopus 로고    scopus 로고
    • Privacy homomorphisms for social networks with private relationship
    • J. D.-Ferrer, A. Viejo, F. Sebé, and Ú. G.-Nicolás, "Privacy homomorphisms for social networks with private relationship," Comput. Netw., pp. 3007-3016, 2008.
    • (2008) Comput. Netw. , pp. 3007-3016
    • D-Ferrer, J.1    Viejo, A.2    Sebé, F.3    G-Nicolás, Ú.4
  • 5
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy-preserving online social network leveraging on real-life trust
    • Dec
    • L. A. Cutillo and R. Molva, "Safebook: a privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, Dec. 2009.
    • (2009) IEEE Communications Magazine , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.A.1    Molva, R.2
  • 10
    • 50249117750 scopus 로고    scopus 로고
    • On the impact of social network profiling on anonymity
    • N. Borisov and I. Goldberg (Eds.): PETS 2008
    • C. Diaz, C. Troncoso, and A. Serjantov, On the impact of social network profiling on anonymity, in N. Borisov and I. Goldberg (Eds.): PETS 2008, LNCS 5134, 2008.
    • (2008) LNCS , vol.5134
    • Diaz, C.1    Troncoso, C.2    Serjantov, A.3
  • 14
    • 84946840347 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairings
    • Advances in Cryptology-Asiacrypt 2001, Springer-Verlag
    • D. Boneh and M. Franklin, Identity-based encryption from the weil pairings, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, pp. 514- 532, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Franklin, M.2
  • 15
    • 84979291225 scopus 로고
    • Broadcast Encryption
    • Advances in Cryptology: CRYPTO'93
    • A. Fiat and M. Naor, Broadcast Encryption, in Advances in Cryptology: CRYPTO'93, LNCS 773, 1993.
    • (1993) LNCS , vol.773
    • Fiat, A.1    Naor, M.2
  • 16
    • 35048901123 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • EUROCRYPT 2004 Springer
    • D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano, "Public key encryption with keyword search," in EUROCRYPT 2004, LNCS 3027. Springer, 2004.
    • (2004) LNCS , vol.3027
    • Boneh, D.1    Crescenzo, G.D.2    Ostrovsky, R.3    Persiano, G.4
  • 17
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • extended abstract in CRYPTO 2001
    • D. Boneh and M. Franklin, "Identity-based encryption from the weil pairing. extended abstract in CRYPTO 2001," SIAM J. of Computing, vol. 32, no. 3, pp. 586-615, 2003.
    • (2003) SIAM J. of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 22
    • 51349100827 scopus 로고    scopus 로고
    • A security architecture achieving anonymity and traceability in wireless mesh networks
    • Apr
    • J. Sun, C. Zhang, and Y. Fang, "A security architecture achieving anonymity and traceability in wireless mesh networks," IEEE Conf. on Computer Communications (INFOCOM), pp. 1687-1695, Apr. 2008.
    • (2008) IEEE Conf. on Computer Communications (INFOCOM) , pp. 1687-1695
    • Sun, J.1    Zhang, C.2    Fang, Y.3
  • 23
    • 67650383453 scopus 로고    scopus 로고
    • Defense against misbehavior in anonymous vehicular ad hoc networks
    • Nov
    • J. Sun and Y. Fang, "Defense against misbehavior in anonymous vehicular ad hoc networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1515-1525, Nov. 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1515-1525
    • Sun, J.1    Fang, Y.2
  • 24
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity-based signature schemes based on pairings
    • SAC 2002, Springer-Verlag
    • F. Hess, Efficient identity-based signature schemes based on pairings, SAC 2002, LNCS 2595, pp. 310-324, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2595 , pp. 310-324
    • Hess, F.1
  • 25
    • 84985922619 scopus 로고
    • Tracing Traitors
    • Advances in Cryptology: CRYPTO'94
    • B. Chor, A. Fiat, and M. Naor, Tracing Traitors, in Advances in Cryptology: CRYPTO'94, LNCS 839, 1994.
    • (1994) LNCS , vol.839
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 26
    • 84957617696 scopus 로고    scopus 로고
    • Threshold Traitor Tracing
    • Advances in Cryptology: CRYPTO'98
    • M. Naor and B. Pinkas, Threshold Traitor Tracing, in Advances in Cryptology: CRYPTO'98, LNCS 1462, 1998.
    • (1998) LNCS , vol.1462
    • Naor, M.1    Pinkas, B.2
  • 27
    • 84957085257 scopus 로고    scopus 로고
    • An Efficient Public Key Traitor Tracing Scheme
    • Advances in Cryptology: CRYPTO'99
    • D. Boneh and M. Franklin, An Efficient Public Key Traitor Tracing Scheme, in Advances in Cryptology: CRYPTO'99, LNCS 1666, 1999.
    • (1999) LNCS , vol.1666
    • Boneh, D.1    Franklin, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.