-
1
-
-
77955912474
-
ESmallTalker: A distributed mobile system for social networking in physical proximity
-
Z. Yang, B. Zhang, J. Dai, A. Champion, D. Xuan, and D. Li, "ESmallTalker: A distributed mobile system for social networking in physical proximity," in ICDCS'10, Genoa, Italy, June 2010.
-
ICDCS'10, Genoa, Italy, June 2010
-
-
Yang, Z.1
Zhang, B.2
Dai, J.3
Champion, A.4
Xuan, D.5
Li, D.6
-
2
-
-
79960878565
-
FindU: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks," in INFOCOM'11, Shanghai, China, Apr. 2011.
-
INFOCOM'11, Shanghai, China, Apr. 2011
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
3
-
-
56749173469
-
VENETA: Serverless friend-of-friend detection in mobile social networking
-
M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "VENETA: Serverless friend-of-friend detection in mobile social networking," in WIMOB'08, Avignon, France, Oct. 2008, pp. 184-189.
-
WIMOB'08, Avignon, France, Oct. 2008
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
4
-
-
84855669629
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," Mobile Networks and Applications, pp. 1-12, 2010.
-
(2010)
Mobile Networks and Applications
, pp. 1-12
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
5
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," in INFOCOM'11, Shanghai, China, Apr. 2011.
-
INFOCOM'11, Shanghai, China, Apr. 2011
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
6
-
-
33745160750
-
Privacy-preserving set operations
-
L. Kissner and D. Song, "Privacy-preserving set operations," in CRYPTO'05, Santa Barbara, CA, Aug. 2005, pp. 241-257.
-
CRYPTO'05, Santa Barbara, CA, Aug. 2005
, pp. 241-257
-
-
Kissner, L.1
Song, D.2
-
7
-
-
41549155611
-
Distributed private matching and set operations
-
Sydney, Australia, Apr.
-
Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations," in ISPEC'08, vol. 4991, Sydney, Australia, Apr. 2008.
-
(2008)
ISPEC'08
, vol.4991
-
-
Ye, Q.1
Wang, H.2
Pieprzyk, J.3
-
9
-
-
84861638583
-
Practical private set intersection protocols with linear complexity
-
E. Cristofaro and G. Tsudik, "Practical private set intersection protocols with linear complexity," in FC'10, Tenerife, Spain, Jan. 2010.
-
FC'10, Tenerife, Spain, Jan. 2010
-
-
Cristofaro, E.1
Tsudik, G.2
-
11
-
-
84861587712
-
Client puzzles: A cryptographic countermeasure against connection depletion attacks
-
A. Juels and J. Brainard, "Client puzzles: A cryptographic countermeasure against connection depletion attacks," in NDSS'99, San Diego, CA, Feb. 1999.
-
NDSS'99, San Diego, CA, Feb. 1999
-
-
Juels, A.1
Brainard, J.2
-
12
-
-
84861608109
-
Secure in-band wireless pairing
-
S. Gollakota, N. Ahmed, N. Zeldovich, and D. Katabi, "Secure in-band wireless pairing," in USENIX Security, San Francisco, CA, Aug. 2011.
-
USENIX Security, San Francisco, CA, Aug. 2011
-
-
Gollakota, S.1
Ahmed, N.2
Zeldovich, N.3
Katabi, D.4
-
14
-
-
84861599846
-
Protocols for secure remote database access with approximate matching
-
W. Du and M. J. Atallah, "Protocols for secure remote database access with approximate matching," in WSPEC'00, Athens, Greece, Nov. 2000.
-
WSPEC'00, Athens, Greece, Nov. 2000
-
-
Du, W.1
Atallah, M.J.2
-
15
-
-
67649764018
-
A personal mobile drm manager for smartphones
-
S. Bhatt et al., "A personal mobile drm manager for smartphones,"Computers & Security, vol. 28, no. 6, pp. 327-340, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 327-340
-
-
Bhatt, S.1
-
16
-
-
0020312165
-
Protocols for secure computations
-
A. C. Yao, "Protocols for secure computations," in SFCS'82, Washington, DC, USA, Nov 1982, pp. 160-164.
-
SFCS'82, Washington, DC, USA, Nov 1982
, pp. 160-164
-
-
Yao, A.C.1
-
17
-
-
0023545076
-
How to play ANY mental game
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play ANY mental game," in STOC'87, New York, NY, 1987, pp. 218-229.
-
STOC'87, New York, NY, 1987
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
84927517111
-
Privacy-preserving cooperative statistical analysis
-
W. Du and M. Atallah, "Privacy-preserving cooperative statistical analysis,"in ACSAC'01, New Orleans, Louisiana, Dec. 2001, pp. 102-110.
-
ACSAC'01, New Orleans, Louisiana, Dec. 2001
, pp. 102-110
-
-
Du, W.1
Atallah, M.2
-
19
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," in ICPP'02, Vancouver, British Columbia, Canada, Aug. 2002, pp. 379-384.
-
ICPP'02, Vancouver, British Columbia, Canada, Aug. 2002
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
20
-
-
26444451487
-
On private scalar product computation for privacy-preserving data mining
-
Seoul, Korea, Dec.
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On private scalar product computation for privacy-preserving data mining," in ICISC'04, vol. 3506, Seoul, Korea, Dec. 2004, pp. 23-25.
-
(2004)
ICISC'04
, vol.3506
, pp. 23-25
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
21
-
-
77951750318
-
Efficient cryptographic primitives for private data mining
-
Jan.
-
M. Shaneck and Y. Kim, "Efficient cryptographic primitives for private data mining," in HICSS'10, Jan. 2010, pp. 1-9.
-
(2010)
HICSS'10
, pp. 1-9
-
-
Shaneck, M.1
Kim, Y.2
-
22
-
-
46749122242
-
Privacy-preserving collaborative filtering using randomized perturbation techniques
-
H. Polat and W. Du, "Privacy-preserving collaborative filtering using randomized perturbation techniques," in ICDM'03, Melbourne, FL, Nov. 2003.
-
ICDM'03, Melbourne, FL, Nov. 2003
-
-
Polat, H.1
Du, W.2
-
23
-
-
84861635445
-
Privacy-preserving information markets for computing statistical data
-
A. Kiayias, B. Yener, and M. Yung, "Privacy-preserving information markets for computing statistical data," in FC'09, Berlin, Heidelberg, Feb. 2009.
-
FC'09, Berlin, Heidelberg, Feb. 2009
-
-
Kiayias, A.1
Yener, B.2
Yung, M.3
|