메뉴 건너뛰기




Volumn , Issue , 2011, Pages 252-259

Privacy-preserving matchmaking for mobile social networking secure against malicious users

Author keywords

[No Author keywords available]

Indexed keywords

KEY COMPONENT; MOBILE PHONE SERVICES; PERSONAL INFORMATION; PRIVACY POINTS; PRIVACY PRESERVING; SMARTPHONES; SOCIAL NETWORKS;

EID: 80052099590     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2011.5971991     Document Type: Conference Paper
Times cited : (41)

References (27)
  • 3
  • 6
    • 35448936042 scopus 로고    scopus 로고
    • Smoke screen: Flexible privacy controls for presence-sharing
    • L. P. Cox, A. Dalton, and V. Marupadi. SmokeScreen: Flexible Privacy Controls for Presence-Sharing. In Proc. of MobiSys '07, pages 233-245.
    • Proc. of MobiSys'07 , pp. 233-245
    • Cox, L.P.1    Dalton, A.2    Marupadi, V.3
  • 7
    • 79957952786 scopus 로고    scopus 로고
    • Reclaiming privacy for smartphone applications
    • E. De Cristofaro, A. Durussel, and I. Aad. Reclaiming Privacy for Smartphone Applications. In Proc. of PerCom 2011, pages 84-92.
    • (2011) Proc. of PerCom , pp. 84-92
    • De Cristofaro, E.1    Durussel, A.2    Aad, I.3
  • 8
    • 78650834525 scopus 로고    scopus 로고
    • Linear-complexity private set intersection protocols secure in malicious model
    • E. De Cristofaro, J. Kim, and G. Tsudik. Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In Proc. of Asiacrypt'10, pages 213-231.
    • Proc. of Asiacrypt'10 , pp. 213-231
    • De Cristofaro, E.1    Kim, J.2    Tsudik, G.3
  • 9
    • 77955318017 scopus 로고    scopus 로고
    • Practical private set intersection protocols with linear computational and bandwidth complexity
    • E. De Cristofaro and G. Tsudik. Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity. In Proc. of Financial Cryptography 2010, pages 143-159.
    • (2010) Proc. of Financial Cryptography , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 11
    • 19944388571 scopus 로고    scopus 로고
    • Social serendipity: Mobilizing social software
    • DOI 10.1109/MPRV.2005.37
    • N. Eagle and A. Pentland. Social Serendipity: Mobilizing Social Software. IEEE Pervasive Computing, 4(2):28-34, 2005. (Pubitemid 40750808)
    • (2005) IEEE Pervasive Computing , vol.4 , Issue.2 , pp. 28-34
    • Eagle, N.1    Pentland, A.2
  • 12
    • 80052091637 scopus 로고    scopus 로고
    • Accessed March 2011
    • Facebook. Statistics. http://www.facebook.com/press/info.php?statistics. Accessed March 2011.
    • Statistics
  • 13
    • 35048820609 scopus 로고    scopus 로고
    • Efficient private matching and set intersection
    • M. J. Freedman, K. Nissim, and B. Pinkas. Efficient Private Matching and Set Intersection. In Proc. of EUROCRYPT 2004, pages 1-19.
    • (2004) Proc. of EUROCRYPT , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 14
    • 80052086509 scopus 로고    scopus 로고
    • Accessed March
    • Gatsby. http://meetgatsby. com/. Accessed March 2011.
    • (2011)
  • 15
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • S. Jarecki and X. Liu. Fast Secure Computation of Set Intersection. In Proc. of SCN 2010, pages 418-435.
    • (2010) Proc. of SCN , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 18
    • 79960878565 scopus 로고    scopus 로고
    • Find U: Privacy-preserving personal profile matching in mobile social networks
    • M. Li, N. Cao, S. Yu, and W. Lou. FindU: Privacy-Preserving Personal Profile Matching in Mobile Social Networks. In Proc. of Infocom 2011.
    • (2011) Proc. of Infocom
    • Li, M.1    Cao, N.2    Yu, S.3    Lou, W.4
  • 19
    • 80052084730 scopus 로고    scopus 로고
    • Accessed March 2011
    • looptmix. http://www.looptmix. com/. Accessed March 2011.
  • 20
    • 74049135283 scopus 로고    scopus 로고
    • SMILE: Encounter-based trust for mobile social services
    • J. Manweiler, R. Scudellari, and L. P. Cox. SMILE: Encounter-Based Trust for Mobile Social Services. In Proc. of CCS 2009, pages 246-255.
    • (2009) Proc. of CCS , pp. 246-255
    • Manweiler, J.1    Scudellari, R.2    Cox, P.L.3
  • 22
    • 80052103261 scopus 로고    scopus 로고
    • Accessed March
    • MOCOM2020. 4. 1 Billion Mobile Phone Subscribers Worldwide. http://www.mocom2020. com/2009/03/ 41-billion-mobile-phone-subscribers- worldwide/. Accessed March 2011.
    • (2011) 1 Billion Mobile Phone Subscribers Worldwide , vol.4
  • 25
    • 72449139107 scopus 로고    scopus 로고
    • Efficient and secure protocols for privacy-preserving set operations
    • November
    • Y. Sang and H. Shen. Efficient and Secure Protocols for Privacy-Preserving Set Operations. ACM Transactions on Information and System Security (TISSEC), 13(1):1-35, November 2009.
    • (2009) ACM Transactions on Information and System Security (TISSEC) , vol.13 , Issue.1 , pp. 1-35
    • Sang, Y.1    Shen, H.2
  • 26
    • 34948849833 scopus 로고    scopus 로고
    • Symmetric cryptographic solution to Yao's millionaires' problem and an evaluation of secure multiparty computations
    • DOI 10.1016/j.ins.2007.07.015, PII S0020025507003611
    • L. Shundong, W. Daoshun, D. Yiqi, and L. Ping. Symmetric Cryptographic Solution to Yao's Millionaires' Problem and an Evaluation of Secure Multiparty Computations. Information Sciences, 178(1):244-255, 2008. (Pubitemid 47531781)
    • (2008) Information Sciences , vol.178 , Issue.1 , pp. 244-255
    • Shundong, L.1    Daoshun, W.2    Yiqi, D.3    Ping, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.