-
1
-
-
84874630722
-
-
Google Latitude, http://www.google.com/latitude
-
Google Latitude
-
-
-
3
-
-
84864169535
-
-
Loopt, http://www.loopt.com/
-
-
-
-
7
-
-
78649999089
-
Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing
-
Tang, K.P., Lin, J., Hong, J.I., Siewiorek, D.P., Sadeh, N.: Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing. In: UbiComp (2010)
-
(2010)
UbiComp
-
-
Tang, K.P.1
Lin, J.2
Hong, J.I.3
Siewiorek, D.P.4
Sadeh, N.5
-
8
-
-
78649592756
-
-
Tsai, J.Y., Kelley, P.G., Cranor, L.F., Sadeh, N.: Location-sharing technologies: Privacy risks and controls (2010), http://cups.cs.cmu.edu/ LBSprivacy/files/TsaiKelleyCranorSadeh 2009.pdf
-
(2010)
Location-sharing Technologies: Privacy Risks and Controls
-
-
Tsai, J.Y.1
Kelley, P.G.2
Cranor, L.F.3
Sadeh, N.4
-
9
-
-
2942524994
-
Location privacy in pervasive computing
-
Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46-55 (2003)
-
(2003)
Pervasive Computing, IEEE
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.1
Stajano, F.2
-
10
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)
-
(2003)
MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
11
-
-
38149114030
-
Safeguarding location privacy in wireless ad-hoc networks
-
Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
-
Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372-390. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4717
, pp. 372-390
-
-
Hashem, T.1
Kulik, L.2
-
13
-
-
84864164694
-
-
Locaccino, http://www.locaccino.org
-
-
-
-
14
-
-
84937411601
-
A privacy awareness system for ubiquitous computing environments
-
Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. Springer, Heidelberg
-
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237-245. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2498
, pp. 237-245
-
-
Langheinrich, M.1
-
15
-
-
79960731913
-
Private sharing of user location over online social networks
-
Freudiger, J., Neu, R., Hubaux, J.P.: Private sharing of user location over online social networks. In: 3rd Hot Topics in Privacy Enhancing Technologies, HotPETs 2010 (2010)
-
(2010)
3rd Hot Topics in Privacy Enhancing Technologies, HotPETs 2010
-
-
Freudiger, J.1
Neu, R.2
Hubaux, J.P.3
-
16
-
-
33745877935
-
Anonymous user tracking for location-based community services
-
Hazas,M., Krumm, J., Strang, T. (eds.) LoCA 2006. Springer, Heidelberg
-
Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C.: Anonymous user tracking for location-based community services. In: Hazas,M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 116-133. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3987
, pp. 116-133
-
-
Ruppel, P.1
Treu, G.2
Küpper, A.3
Linnhoff-Popien, C.4
-
17
-
-
38149079700
-
Louis, lester and pierre: Three protocols for location privacy
-
Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
-
Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4776
, pp. 62-76
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
-
18
-
-
79960453927
-
Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies
-
abs/1007.0408
-
Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
-
(2010)
CoRR
-
-
Mascetti, S.1
Freni, D.2
Bettini, C.3
Wang, X.S.4
Jajodia, S.5
-
19
-
-
77955199357
-
Private and flexible proximity detection in mobile social networks
-
Siksnys, L., Thomsen, J.R., Saltenis, S., Yiu, M.L.: Private and flexible proximity detection in mobile social networks. In: Mobile Data Management, pp. 75-84 (2010)
-
(2010)
Mobile Data Management
, pp. 75-84
-
-
Siksnys, L.1
Thomsen, J.R.2
Saltenis, S.3
Yiu, M.L.4
-
20
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.J.3
-
21
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
22
-
-
50249137692
-
Shared and searchable encrypted data for untrusted servers
-
Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: DBSec., pp. 127-143 (2008)
-
(2008)
DBSec.
, pp. 127-143
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
23
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
25
-
-
24944579882
-
Efficient computation of tate pairing in projective coordinate over general characteristic fields
-
Park, C.-s., Chee, S. (eds.) ICISC 2004. Springer, Heidelberg
-
Chatterjee, S., Sarkar, P., Barua, R.: Efficient computation of tate pairing in projective coordinate over general characteristic fields. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 168-181. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3506
, pp. 168-181
-
-
Chatterjee, S.1
Sarkar, P.2
Barua, R.3
-
26
-
-
24144479376
-
Computing the tate pairing
-
Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
-
Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3376
, pp. 293-304
-
-
Scott, M.1
-
29
-
-
37149007406
-
Survey and benchmark of stream ciphers for wireless sensor networks
-
Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg
-
Fournel, N., Minier, M., Ubéda, S.: Survey and benchmark of stream ciphers for wireless sensor networks. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 202-214. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4462
, pp. 202-214
-
-
Fournel, N.1
Minier, M.2
Ubéda, S.3
-
30
-
-
85028913061
-
On-line/Off-line digital signatures
-
Brassard, G. (ed.) CRYPTO 1989 Springer, Heidelberg
-
Even, S., Goldreich, O.,Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263-275. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 263-275
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
31
-
-
54249155201
-
Identity-based online/Offline encryption
-
Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
-
Guo, F., Mu, Y., Chen, Z.: Identity-based online/Offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247-261. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5143
, pp. 247-261
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
32
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
Zhang, L., Tiwana, B., Qian, Z., Wang, Z., Dick, R., Mao, Z.M., Yang, L.: Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In: Proceedings of CODES+ISSS (2010)
-
Proceedings of CODES+ISSS (2010)
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.5
Mao, Z.M.6
Yang, L.7
-
34
-
-
35048849890
-
Compressed pairings
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Scott, M., Barreto, P.S.L.M.: Compressed pairings. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 140-156. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 140-156
-
-
Scott, M.1
Barreto, P.S.L.M.2
-
35
-
-
84864168202
-
-
Tor, http://www.torproject.org/
-
-
-
-
36
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
37
-
-
79960720911
-
-
Technical Report MIT-CSAIL-TR-2011-005, MIT
-
Popa, R.A., Zeldovich, N., Balakrishnan, H.: Cryptdb: A practical encrypted relational dbms. Technical Report MIT-CSAIL-TR-2011-005, MIT (2011)
-
(2011)
Cryptdb: A Practical Encrypted Relational Dbms
-
-
Popa, R.A.1
Zeldovich, N.2
Balakrishnan, H.3
|