-
1
-
-
79960862495
-
-
[Online]
-
"Magnetu." [Online]. Available: http://magnetu.com
-
-
-
-
2
-
-
74049135283
-
Smile: Encounter-based trust for mobile social services
-
J. Manweiler, R. Scudellari, and L. P. Cox, "Smile: encounter-based trust for mobile social services," in ACM CCS '09, 2009, pp. 246-255.
-
(2009)
ACM CCS '09
, pp. 246-255
-
-
Manweiler, J.1
Scudellari, R.2
Cox, L.P.3
-
3
-
-
79960877474
-
-
[Online]
-
"Familiar strangers." [Online]. Available: http://www.paulos. net/research/intel/familiarstranger/index.htm
-
Familiar strangers
-
-
-
4
-
-
79960879840
-
E-smalltalker: A distributed mobile system for social networking in physical proximity
-
June.
-
Z. Yang, B. Zhang, J. Dai, A. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in IEEE ICDCS '10, June. 2010.
-
(2010)
IEEE ICDCS '10
-
-
Yang, Z.1
Zhang, B.2
Dai, J.3
Champion, A.4
Xuan, D.5
Li, D.6
-
5
-
-
84855669629
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," Mobile Networks and Applications, pp. 1-12, 2010.
-
(2010)
Mobile Networks and Applications
, pp. 1-12
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
6
-
-
77953304550
-
Group device pairing based secure sensor association and key management for body area networks
-
Mar. 14-19
-
M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in IEEE INFOCOM '10, Mar. 14-19 2010, pp. 1-9.
-
(2010)
IEEE INFOCOM '10
, pp. 1-9
-
-
Li, M.1
Yu, S.2
Lou, W.3
Ren, K.4
-
7
-
-
35048820609
-
Efficient private matching and set intersection
-
Springer- Verlag
-
M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in EUROCRYPT'04. Springer-Verlag, 2004, pp. 1-19.
-
(2004)
EUROCRYPT'04
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
8
-
-
0020312165
-
Protocols for secure computations
-
A. C. Yao, "Protocols for secure computations," in SFCS '82, 1982, pp. 160-164.
-
(1982)
SFCS ' 82
, pp. 160-164
-
-
Yao, A.C.1
-
9
-
-
41549155611
-
Distributed private matching and set operations
-
Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations," in ISPEC'08, 2008, pp. 347-360.
-
(2008)
ISPEC'08
, pp. 347-360
-
-
Ye, Q.1
Wang, H.2
Pieprzyk, J.3
-
11
-
-
33745160750
-
Privacy-preserving set operations
-
LNCS. Springer
-
L. Kissner and D. Song, "Privacy-preserving set operations," in CRYPTO '05, LNCS. Springer, 2005, pp. 241-257.
-
(2005)
CRYPTO '05
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
12
-
-
51849139413
-
Efficient privacy-preserving k-nearest neighbor search
-
Y. Qi and M. J. Atallah, "Efficient privacy-preserving k-nearest neighbor search," in IEEE ICDCS '08, 2008, pp. 311-319.
-
(2008)
IEEE ICDCS '08
, pp. 311-319
-
-
Qi, Y.1
Atallah, M.J.2
-
13
-
-
79960875577
-
Privacy preserving nearest neighbor search
-
M. Shaneck, Y. Kim, and V. Kumar, "Privacy preserving nearest neighbor search," in Machine Learning in Cyber Trust, 2009, pp. 247-276.
-
(2009)
Machine Learning in Cyber Trust
, pp. 247-276
-
-
Shaneck, M.1
Kim, Y.2
Kumar, V.3
-
15
-
-
41549104640
-
Efficient protocols for privacy preserving matching against distributed datasets
-
Springer - Verlag
-
Y. Sang, H. Shen, and N. Xiong, "Efficient protocols for privacy preserving matching against distributed datasets," in ICICS '06. Springer - Verlag, 2006, pp. 210-227.
-
(2006)
ICICS ' 06
, pp. 210-227
-
-
Sang, Y.1
Shen, H.2
Xiong, N.3
-
16
-
-
68949136946
-
Efficient robust private set intersection
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung, "Efficient robust private set intersection," in ACNS '09, 2009, pp. 125-142.
-
(2009)
ACNS ' 09
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
17
-
-
38049043364
-
An unconditionally secure protocol for multi-party set intersection
-
R. Li and C. Wu, "An unconditionally secure protocol for multi-party set intersection," in ACNS '07, 2007, pp. 226-236.
-
(2007)
ACNS ' 07
, pp. 226-236
-
-
Li, R.1
Wu, C.2
-
18
-
-
71549153480
-
Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security
-
Springer - Verlag, Dec.
-
G. S. Narayanan, T. Aishwarya, A. Agrawal, A. Patra, A. Choudhary, and C. P. Rangan, "Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security," in CANS '09. Springer - Verlag, Dec. 2009, pp. 21-40.
-
(2009)
CANS ' 09
, pp. 21-40
-
-
Narayanan, G.S.1
Aishwarya, T.2
Agrawal, A.3
Patra, A.4
Choudhary, A.5
Rangan, C.P.6
-
19
-
-
77951750318
-
Efficient cryptographic primitives for private data mining
-
M. Shaneck and Y. Kim, "Efficient cryptographic primitives for private data mining," in HICSS '10, 2010, pp. 1-9.
-
(2010)
HICSS ' 10
, pp. 1-9
-
-
Shaneck, M.1
Kim, Y.2
-
20
-
-
40249108370
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell, "Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries," in TCC'08, 2008, pp. 155-175.
-
(2008)
TCC'08
, pp. 155-175
-
-
Hazay, C.1
Lindell, Y.2
-
21
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
Berlin, Heidelberg: Springer- Verlag
-
S. Jarecki and X. Liu, "Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection," in TCC '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 577-594.
-
(2009)
TCC ' 09
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
22
-
-
1142303699
-
Information sharing across private databases
-
New York, NY, USA: ACM
-
R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in SIGMOD '03. New York, NY, USA: ACM, 2003, pp. 86-97.
-
(2003)
SIGMOD ' 03
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
23
-
-
10944227231
-
Secure set intersection cardinality with application to association rule mining
-
J. Vaidya and C. Clifton, "Secure set intersection cardinality with application to association rule mining," J. Comput. Secur., vol. 13, no. 4, pp. 593-622, 2005.
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.4
, pp. 593-622
-
-
Vaidya, J.1
Clifton, C.2
-
24
-
-
56749173469
-
Veneta: Serverless friend-of-friend detection in mobile social networking
-
Oct.
-
M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "Veneta: Serverless friend-of-friend detection in mobile social networking," in IEEE WIMOB '08, Oct. 2008, pp. 184 -189.
-
(2008)
IEEE WIMOB '08
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
25
-
-
84891471665
-
Private matching
-
Y. Li, J. Tygar, and J. Hellerstein, "Private matching," in Computer Security in the 21st Century, 2005, pp. 25-50.
-
(2005)
Computer Security in the 21st Century
, pp. 25-50
-
-
Li, Y.1
Tygar, J.2
Hellerstein, J.3
-
26
-
-
33749610153
-
Privacy preserving query processing using third parties
-
F. Emekci, D. Agrawal, A. E. Abbadi, and A. Gulbeden, "Privacy preserving query processing using third parties," in ICDE '06, 2006, p. 27.
-
(2006)
ICDE ' 06
, pp. 27
-
-
Emekci, F.1
Agrawal, D.2
Abbadi, A.E.3
Gulbeden, A.4
-
27
-
-
79960885939
-
Two-party computation model for privacy-preserving queries over distributed databases
-
S. S. M. Chow, J.-H. Lee, and L. Subramanian, "Two-party computation model for privacy-preserving queries over distributed databases," in NDSS, 2009.
-
(2009)
NDSS
-
-
Chow, S.S.M.1
Lee, J.-H.2
Subramanian, L.3
-
28
-
-
0018545449
-
How to share a secret
-
ACM
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
85034837254
-
Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)
-
J. C. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)," in CRYPTO '86, 1987, pp. 251-260.
-
(1987)
CRYPTO
, vol.86
, pp. 251-260
-
-
Benaloh, J.C.1
-
30
-
-
84898960610
-
Completeness theorems for non-cryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC '88, 1988, pp. 1-10.
-
(1988)
ACM STOC '88
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
31
-
-
0031628398
-
Simplified vss and fast-track multiparty computations with applications to threshold cryptography
-
R. Gennaro, M. O. Rabin, and T. Rabin, "Simplified vss and fast-track multiparty computations with applications to threshold cryptography," in ACM PODC '98, 1998, pp. 101-111.
-
(1998)
ACM PODC '98
, pp. 101-111
-
-
Gennaro, R.1
Rabin, M.O.2
Rabin, T.3
-
33
-
-
38049034355
-
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
-
T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," in PKC'07, pp. 343-360.
-
PKC'07
, pp. 343-360
-
-
Nishide, T.1
Ohta, K.2
-
34
-
-
33746065125
-
Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation
-
Springer
-
E. Kiltz, "Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation," in TCC '05. Springer, 2005.
-
(2005)
TCC ' 05
-
-
Kiltz, E.1
-
35
-
-
79960882565
-
-
"Ns2," http://www.isi.edu/nsnam/ns.
-
-
-
|