메뉴 건너뛰기




Volumn 358 AICT, Issue , 2011, Pages 133-148

Longitude: A privacy-preserving location sharing protocol for mobile applications

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CELLULAR TELEPHONES; DATA PRIVACY; MIDDLEWARE; MOBILE PHONES; TELEPHONE SETS;

EID: 79960702552     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-22200-9_12     Document Type: Conference Paper
Times cited : (15)

References (37)
  • 1
  • 3
    • 84864169535 scopus 로고    scopus 로고
    • Loopt, http://www.loopt.com/
  • 7
    • 78649999089 scopus 로고    scopus 로고
    • Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing
    • Tang, K.P., Lin, J., Hong, J.I., Siewiorek, D.P., Sadeh, N.: Rethinking location sharing: Exploring the implications of social-driven vs. purpose-driven location sharing. In: UbiComp (2010)
    • (2010) UbiComp
    • Tang, K.P.1    Lin, J.2    Hong, J.I.3    Siewiorek, D.P.4    Sadeh, N.5
  • 9
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • Beresford, A., Stajano, F.: Location privacy in pervasive computing. Pervasive Computing, IEEE 2(1), 46-55 (2003)
    • (2003) Pervasive Computing, IEEE , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.1    Stajano, F.2
  • 10
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys (2003)
    • (2003) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 11
    • 38149114030 scopus 로고    scopus 로고
    • Safeguarding location privacy in wireless ad-hoc networks
    • Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. Springer, Heidelberg
    • Hashem, T., Kulik, L.: Safeguarding location privacy in wireless ad-hoc networks. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 372-390. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4717 , pp. 372-390
    • Hashem, T.1    Kulik, L.2
  • 13
    • 84864164694 scopus 로고    scopus 로고
    • Locaccino, http://www.locaccino.org
  • 14
    • 84937411601 scopus 로고    scopus 로고
    • A privacy awareness system for ubiquitous computing environments
    • Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. Springer, Heidelberg
    • Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237-245. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2498 , pp. 237-245
    • Langheinrich, M.1
  • 16
    • 33745877935 scopus 로고    scopus 로고
    • Anonymous user tracking for location-based community services
    • Hazas,M., Krumm, J., Strang, T. (eds.) LoCA 2006. Springer, Heidelberg
    • Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C.: Anonymous user tracking for location-based community services. In: Hazas,M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 116-133. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3987 , pp. 116-133
    • Ruppel, P.1    Treu, G.2    Küpper, A.3    Linnhoff-Popien, C.4
  • 17
    • 38149079700 scopus 로고    scopus 로고
    • Louis, lester and pierre: Three protocols for location privacy
    • Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
    • Zhong, G., Goldberg, I., Hengartner, U.: Louis, lester and pierre: Three protocols for location privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4776 , pp. 62-76
    • Zhong, G.1    Goldberg, I.2    Hengartner, U.3
  • 18
    • 79960453927 scopus 로고    scopus 로고
    • Privacy in geo-social networks: Proximity notification with untrusted service providers and curious buddies
    • abs/1007.0408
    • Mascetti, S., Freni, D., Bettini, C., Wang, X.S., Jajodia, S.: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
    • (2010) CoRR
    • Mascetti, S.1    Freni, D.2    Bettini, C.3    Wang, X.S.4    Jajodia, S.5
  • 19
  • 20
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.J.3
  • 21
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 22
    • 50249137692 scopus 로고    scopus 로고
    • Shared and searchable encrypted data for untrusted servers
    • Dong, C., Russello, G., Dulay, N.: Shared and searchable encrypted data for untrusted servers. In: DBSec., pp. 127-143 (2008)
    • (2008) DBSec. , pp. 127-143
    • Dong, C.1    Russello, G.2    Dulay, N.3
  • 23
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. SIAM J. Comput. 32(3), 586-615 (2003)
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 25
    • 24944579882 scopus 로고    scopus 로고
    • Efficient computation of tate pairing in projective coordinate over general characteristic fields
    • Park, C.-s., Chee, S. (eds.) ICISC 2004. Springer, Heidelberg
    • Chatterjee, S., Sarkar, P., Barua, R.: Efficient computation of tate pairing in projective coordinate over general characteristic fields. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 168-181. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3506 , pp. 168-181
    • Chatterjee, S.1    Sarkar, P.2    Barua, R.3
  • 26
    • 24144479376 scopus 로고    scopus 로고
    • Computing the tate pairing
    • Menezes, A. (ed.) CT-RSA 2005. Springer, Heidelberg
    • Scott, M.: Computing the tate pairing. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 293-304. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3376 , pp. 293-304
    • Scott, M.1
  • 29
    • 37149007406 scopus 로고    scopus 로고
    • Survey and benchmark of stream ciphers for wireless sensor networks
    • Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. Springer, Heidelberg
    • Fournel, N., Minier, M., Ubéda, S.: Survey and benchmark of stream ciphers for wireless sensor networks. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol. 4462, pp. 202-214. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4462 , pp. 202-214
    • Fournel, N.1    Minier, M.2    Ubéda, S.3
  • 30
    • 85028913061 scopus 로고
    • On-line/Off-line digital signatures
    • Brassard, G. (ed.) CRYPTO 1989 Springer, Heidelberg
    • Even, S., Goldreich, O.,Micali, S.: On-line/Off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263-275. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 263-275
    • Even, S.1    Goldreich, O.2    Micali, S.3
  • 31
    • 54249155201 scopus 로고    scopus 로고
    • Identity-based online/Offline encryption
    • Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
    • Guo, F., Mu, Y., Chen, Z.: Identity-based online/Offline encryption. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 247-261. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5143 , pp. 247-261
    • Guo, F.1    Mu, Y.2    Chen, Z.3
  • 34
    • 35048849890 scopus 로고    scopus 로고
    • Compressed pairings
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Scott, M., Barreto, P.S.L.M.: Compressed pairings. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 140-156. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 140-156
    • Scott, M.1    Barreto, P.S.L.M.2
  • 35
    • 84864168202 scopus 로고    scopus 로고
    • Tor, http://www.torproject.org/
  • 36
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.