메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2435-2443

FindU: Privacy-preserving personal profile matching in mobile social networks

Author keywords

[No Author keywords available]

Indexed keywords

BEST MATCH; EXISTING SYSTEMS; MATCHING SCHEME; MINIMAL INFORMATION; MOBILE SOCIAL NETWORKS; PERFORMANCE EVALUATION; PERSONAL PREFERENCES; PERSONAL PROFILE; PHYSICAL PROXIMITY; PRIVACY PRESERVING; SECURE MULTI-PARTY COMPUTATION; SECURITY ANALYSIS; SENSITIVE INFORMATIONS; STATE-OF-THE-ART SCHEME; USER PRIVACY;

EID: 79960878565     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5935065     Document Type: Conference Paper
Times cited : (203)

References (35)
  • 1
    • 79960862495 scopus 로고    scopus 로고
    • [Online]
    • "Magnetu." [Online]. Available: http://magnetu.com
  • 2
    • 74049135283 scopus 로고    scopus 로고
    • Smile: Encounter-based trust for mobile social services
    • J. Manweiler, R. Scudellari, and L. P. Cox, "Smile: encounter-based trust for mobile social services," in ACM CCS '09, 2009, pp. 246-255.
    • (2009) ACM CCS '09 , pp. 246-255
    • Manweiler, J.1    Scudellari, R.2    Cox, L.P.3
  • 3
    • 79960877474 scopus 로고    scopus 로고
    • [Online]
    • "Familiar strangers." [Online]. Available: http://www.paulos. net/research/intel/familiarstranger/index.htm
    • Familiar strangers
  • 4
    • 79960879840 scopus 로고    scopus 로고
    • E-smalltalker: A distributed mobile system for social networking in physical proximity
    • June.
    • Z. Yang, B. Zhang, J. Dai, A. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in IEEE ICDCS '10, June. 2010.
    • (2010) IEEE ICDCS '10
    • Yang, Z.1    Zhang, B.2    Dai, J.3    Champion, A.4    Xuan, D.5    Li, D.6
  • 5
    • 84855669629 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mhealthcare social network
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," Mobile Networks and Applications, pp. 1-12, 2010.
    • (2010) Mobile Networks and Applications , pp. 1-12
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 6
    • 77953304550 scopus 로고    scopus 로고
    • Group device pairing based secure sensor association and key management for body area networks
    • Mar. 14-19
    • M. Li, S. Yu, W. Lou, and K. Ren, "Group device pairing based secure sensor association and key management for body area networks," in IEEE INFOCOM '10, Mar. 14-19 2010, pp. 1-9.
    • (2010) IEEE INFOCOM '10 , pp. 1-9
    • Li, M.1    Yu, S.2    Lou, W.3    Ren, K.4
  • 7
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • Springer- Verlag
    • M. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in EUROCRYPT'04. Springer-Verlag, 2004, pp. 1-19.
    • (2004) EUROCRYPT'04 , pp. 1-19
    • Freedman, M.1    Nissim, K.2    Pinkas, B.3
  • 8
    • 0020312165 scopus 로고
    • Protocols for secure computations
    • A. C. Yao, "Protocols for secure computations," in SFCS '82, 1982, pp. 160-164.
    • (1982) SFCS ' 82 , pp. 160-164
    • Yao, A.C.1
  • 9
    • 41549155611 scopus 로고    scopus 로고
    • Distributed private matching and set operations
    • Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations," in ISPEC'08, 2008, pp. 347-360.
    • (2008) ISPEC'08 , pp. 347-360
    • Ye, Q.1    Wang, H.2    Pieprzyk, J.3
  • 11
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-preserving set operations
    • LNCS. Springer
    • L. Kissner and D. Song, "Privacy-preserving set operations," in CRYPTO '05, LNCS. Springer, 2005, pp. 241-257.
    • (2005) CRYPTO '05 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 12
    • 51849139413 scopus 로고    scopus 로고
    • Efficient privacy-preserving k-nearest neighbor search
    • Y. Qi and M. J. Atallah, "Efficient privacy-preserving k-nearest neighbor search," in IEEE ICDCS '08, 2008, pp. 311-319.
    • (2008) IEEE ICDCS '08 , pp. 311-319
    • Qi, Y.1    Atallah, M.J.2
  • 15
    • 41549104640 scopus 로고    scopus 로고
    • Efficient protocols for privacy preserving matching against distributed datasets
    • Springer - Verlag
    • Y. Sang, H. Shen, and N. Xiong, "Efficient protocols for privacy preserving matching against distributed datasets," in ICICS '06. Springer - Verlag, 2006, pp. 210-227.
    • (2006) ICICS ' 06 , pp. 210-227
    • Sang, Y.1    Shen, H.2    Xiong, N.3
  • 17
    • 38049043364 scopus 로고    scopus 로고
    • An unconditionally secure protocol for multi-party set intersection
    • R. Li and C. Wu, "An unconditionally secure protocol for multi-party set intersection," in ACNS '07, 2007, pp. 226-236.
    • (2007) ACNS ' 07 , pp. 226-236
    • Li, R.1    Wu, C.2
  • 18
    • 71549153480 scopus 로고    scopus 로고
    • Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security
    • Springer - Verlag, Dec.
    • G. S. Narayanan, T. Aishwarya, A. Agrawal, A. Patra, A. Choudhary, and C. P. Rangan, "Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security," in CANS '09. Springer - Verlag, Dec. 2009, pp. 21-40.
    • (2009) CANS ' 09 , pp. 21-40
    • Narayanan, G.S.1    Aishwarya, T.2    Agrawal, A.3    Patra, A.4    Choudhary, A.5    Rangan, C.P.6
  • 19
    • 77951750318 scopus 로고    scopus 로고
    • Efficient cryptographic primitives for private data mining
    • M. Shaneck and Y. Kim, "Efficient cryptographic primitives for private data mining," in HICSS '10, 2010, pp. 1-9.
    • (2010) HICSS ' 10 , pp. 1-9
    • Shaneck, M.1    Kim, Y.2
  • 20
    • 40249108370 scopus 로고    scopus 로고
    • Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
    • C. Hazay and Y. Lindell, "Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries," in TCC'08, 2008, pp. 155-175.
    • (2008) TCC'08 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 21
    • 70350656283 scopus 로고    scopus 로고
    • Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
    • Berlin, Heidelberg: Springer- Verlag
    • S. Jarecki and X. Liu, "Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection," in TCC '09. Berlin, Heidelberg: Springer-Verlag, 2009, pp. 577-594.
    • (2009) TCC ' 09 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 22
    • 1142303699 scopus 로고    scopus 로고
    • Information sharing across private databases
    • New York, NY, USA: ACM
    • R. Agrawal, A. Evfimievski, and R. Srikant, "Information sharing across private databases," in SIGMOD '03. New York, NY, USA: ACM, 2003, pp. 86-97.
    • (2003) SIGMOD ' 03 , pp. 86-97
    • Agrawal, R.1    Evfimievski, A.2    Srikant, R.3
  • 23
    • 10944227231 scopus 로고    scopus 로고
    • Secure set intersection cardinality with application to association rule mining
    • J. Vaidya and C. Clifton, "Secure set intersection cardinality with application to association rule mining," J. Comput. Secur., vol. 13, no. 4, pp. 593-622, 2005.
    • (2005) J. Comput. Secur. , vol.13 , Issue.4 , pp. 593-622
    • Vaidya, J.1    Clifton, C.2
  • 24
    • 56749173469 scopus 로고    scopus 로고
    • Veneta: Serverless friend-of-friend detection in mobile social networking
    • Oct.
    • M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "Veneta: Serverless friend-of-friend detection in mobile social networking," in IEEE WIMOB '08, Oct. 2008, pp. 184 -189.
    • (2008) IEEE WIMOB '08 , pp. 184-189
    • Von Arb, M.1    Bader, M.2    Kuhn, M.3    Wattenhofer, R.4
  • 26
    • 33749610153 scopus 로고    scopus 로고
    • Privacy preserving query processing using third parties
    • F. Emekci, D. Agrawal, A. E. Abbadi, and A. Gulbeden, "Privacy preserving query processing using third parties," in ICDE '06, 2006, p. 27.
    • (2006) ICDE ' 06 , pp. 27
    • Emekci, F.1    Agrawal, D.2    Abbadi, A.E.3    Gulbeden, A.4
  • 27
    • 79960885939 scopus 로고    scopus 로고
    • Two-party computation model for privacy-preserving queries over distributed databases
    • S. S. M. Chow, J.-H. Lee, and L. Subramanian, "Two-party computation model for privacy-preserving queries over distributed databases," in NDSS, 2009.
    • (2009) NDSS
    • Chow, S.S.M.1    Lee, J.-H.2    Subramanian, L.3
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • ACM
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 29
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)
    • J. C. Benaloh, "Secret sharing homomorphisms: Keeping shares of a secret secret (extended abstract)," in CRYPTO '86, 1987, pp. 251-260.
    • (1987) CRYPTO , vol.86 , pp. 251-260
    • Benaloh, J.C.1
  • 30
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • M. Ben-Or, S. Goldwasser, and A. Wigderson, "Completeness theorems for non-cryptographic fault-tolerant distributed computation," in ACM STOC '88, 1988, pp. 1-10.
    • (1988) ACM STOC '88 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 31
    • 0031628398 scopus 로고    scopus 로고
    • Simplified vss and fast-track multiparty computations with applications to threshold cryptography
    • R. Gennaro, M. O. Rabin, and T. Rabin, "Simplified vss and fast-track multiparty computations with applications to threshold cryptography," in ACM PODC '98, 1998, pp. 101-111.
    • (1998) ACM PODC '98 , pp. 101-111
    • Gennaro, R.1    Rabin, M.O.2    Rabin, T.3
  • 33
    • 38049034355 scopus 로고    scopus 로고
    • Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
    • T. Nishide and K. Ohta, "Multiparty computation for interval, equality, and comparison without bit-decomposition protocol," in PKC'07, pp. 343-360.
    • PKC'07 , pp. 343-360
    • Nishide, T.1    Ohta, K.2
  • 34
    • 33746065125 scopus 로고    scopus 로고
    • Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation
    • Springer
    • E. Kiltz, "Unconditionally secure constant round multi-party computation for equality, comparison, bits and exponentiation," in TCC '05. Springer, 2005.
    • (2005) TCC ' 05
    • Kiltz, E.1
  • 35
    • 79960882565 scopus 로고    scopus 로고
    • "Ns2," http://www.isi.edu/nsnam/ns.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.