메뉴 건너뛰기




Volumn 6, Issue 4, 2011, Pages 237-248

Authenticating strangers in Online Social Networks

Author keywords

Authentication; Fast mixing; Online Social Networks; OSNs; Secure set intersection; Zero knowledge proof

Indexed keywords

AUTHENTICATION; MIXING;

EID: 84863152158     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/IJSN.2011.045231     Document Type: Article
Times cited : (10)

References (24)
  • 1
    • 84865622599 scopus 로고    scopus 로고
    • All your contacts are belong to us: Automated identity theft attacks on social networks
    • 20-24 April, Madrid, Spain
    • Bilge, L., Strufe, T., Balzarotti, D. and Kirda, E. (2009) 'All your contacts are belong to us: Automated identity theft attacks on social networks', WWW, ACM, 20-24 April, Madrid, Spain, pp.551-560.
    • (2009) WWW, ACM , pp. 551-560
    • Bilge, L.1    Strufe, T.2    Balzarotti, D.3    Kirda, E.4
  • 2
    • 74049137084 scopus 로고    scopus 로고
    • Oblivious transfer with access control
    • ACM, 9-13 November, Chicago, IL, USA
    • Camenisch, J., Dubovitskaya, M. and Neven, G. (2009a) 'Oblivious transfer with access control', CCS, ACM, 9-13 November, Chicago, IL, USA, pp.131-140.
    • (2009) CCS , pp. 131-140
    • Camenisch, J.1    Dubovitskaya, M.2    Neven, G.3
  • 3
    • 67650686038 scopus 로고    scopus 로고
    • On the portability of generalized schnorr proofs
    • 26-30 April, Cologne, Germany
    • Camenisch, J., Kiayias, A. and Yung, M. (2009b) 'On the portability of generalized schnorr proofs', EUROCRYPT 2009, 26-30 April, Cologne, Germany, pp.425-442.
    • (2009) EUROCRYPT 2009 , pp. 425-442
    • Camenisch, J.1    Kiayias, A.2    Yung, M.3
  • 4
    • 84958612917 scopus 로고    scopus 로고
    • Efficient group signature schemes for large groups
    • Advances in Cryptology - CRYPTO '97
    • Camenisch, J. and Stadler, M. (1997) 'Efficient group signature schemes for large groups', CRYPTO'97, 17-21 August, Santa Barbara, California, USA, pp.410-424. (Pubitemid 127112569)
    • (1997) Lecture Notes in Computer Science , Issue.1294 , pp. 410-424
    • Camenisch, J.1    Stadler, M.2
  • 5
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Springer, 16-20 August Santa Barbara, CA, USA
    • Chaum, D. and Pedersen, T. (1993) 'Wallet databases with observers', CRYPTO'92, Springer, 16-20 August, 1992, Santa Barbara, CA, USA, pp.89-105.
    • (1992) CRYPTO'92 , pp. 89-105
    • Chaum, D.1    Pedersen, T.2
  • 6
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • Springer, 21-25 August, Santa Barbara, CA, USA
    • Cramer, R., Damgård, I. and Schoenmakers, B. (1994) 'Proofs of partial knowledge and simplified design of witness hiding protocols', CRYPTO94, Springer, 21-25 August, Santa Barbara, CA, USA, pp.174-187.
    • (1994) CRYPTO94 , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 7
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • 8-11 February, San Diego, CA, USA
    • Danezis, G. and Mittal, P. (2009) 'Sybilinfer: detecting sybil nodes using social networks', NDSS, 8-11 February, San Diego, CA, USA.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 8
    • 8344262333 scopus 로고    scopus 로고
    • A key management scheme for wireless sensor networks using deployment knowledge
    • IEEE
    • Du, W., Deng, J., Han, Y., Chen, S. and Varshney, P. (2004) 'A key management scheme for wireless sensor networks using deployment knowledge', INFOCOM 2004, Vol. 1, IEEE, pp.586-597.
    • (2004) INFOCOM 2004 , vol.1 , pp. 586-597
    • Du, W.1    Deng, J.2    Han, Y.3    Chen, S.4    Varshney, P.5
  • 10
    • 78650032056 scopus 로고    scopus 로고
    • A new framework for efficient password-based authenticated key exchange
    • ACM
    • Groce, A. and Katz, J. (2010) 'A new framework for efficient password-based authenticated key exchange', CCS, ACM, pp.516-525.
    • (2010) CCS , pp. 516-525
    • Groce, A.1    Katz, J.2
  • 11
    • 67650691581 scopus 로고    scopus 로고
    • Realizing hash-and-sign signatures under standard assumptions
    • Hohenberger, S. and Waters, B. (2009) 'Realizing hash-and-sign signatures under standard assumptions', EUROCRYPT 2009, pp.333-350.
    • (2009) EUROCRYPT 2009 , pp. 333-350
    • Hohenberger, S.1    Waters, B.2
  • 12
    • 0038308135 scopus 로고    scopus 로고
    • A double authentication scheme to detect impersonation attack in link state routing protocols
    • IEEE
    • Huang, D., Sinha, A. and Medhi, D. (2003) 'A double authentication scheme to detect impersonation attack in link state routing protocols', ICC'03, Vol. 3, IEEE, pp.1723-1727.
    • (2003) ICC'03 , vol.3 , pp. 1723-1727
    • Huang, D.1    Sinha, A.2    Medhi, D.3
  • 17
    • 2342616749 scopus 로고    scopus 로고
    • Random walks on complex networks
    • Noh, J. and Rieger, H. (2004) 'Random walks on complex networks', Physical Review Letters, Vol. 92, No. 11, p.118701.
    • (2004) Physical Review Letters , vol.92 , Issue.11 , pp. 118701
    • Noh, J.1    Rieger, H.2
  • 18
    • 36248988077 scopus 로고    scopus 로고
    • On broadcast authentication in wireless sensor networks
    • DOI 10.1109/TWC.2007.060255
    • Ren, K., Lou, W., Zeng, K. and Moran, P. (2007) 'On broadcast authentication in wireless sensor networks', Wireless Communications, IEEE Transactions on, Vol. 6, No. 11, pp.4136-4144. (Pubitemid 350121763)
    • (2007) IEEE Transactions on Wireless Communications , vol.6 , Issue.11 , pp. 4136-4144
    • Ren, K.1    Lou, W.2    Zeng, K.3    Moran, P.J.4
  • 19
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C. (1991) 'Efficient signature generation by smart cards', Journal of cryptology, Vol. 4, No. 3, pp.161-174.
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 20
    • 4544241048 scopus 로고    scopus 로고
    • IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks
    • Shi, M., Shen, X. and Mark, J. (2004) 'IEEE 802.11 roaming and authentication in wireless LAN/cellular mobile networks', Wireless Communications, IEEE, Vol. 11, No. 4, pp.66-75.
    • (2004) Wireless Communications, IEEE , vol.11 , Issue.4 , pp. 66-75
    • Shi, M.1    Shen, X.2    Mark, J.3
  • 21
    • 78149337076 scopus 로고    scopus 로고
    • An analysis of social network-based sybil defenses
    • ACM
    • Viswanath, B., Post, A., Gummadi, K. and Mislove, A. (2010) 'An analysis of social network-based sybil defenses', SIGCOMM, ACM, pp.363-374.
    • (2010) SIGCOMM , pp. 363-374
    • Viswanath, B.1    Post, A.2    Gummadi, K.3    Mislove, A.4
  • 22
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • DOI 10.1145/1151659.1159945
    • Yu, H., Kaminsky, M., Gibbons, P. and Flaxman, A. (2006) 'Sybilguard: defending against sybil attacks via social networks', SIGCOMM, ACM, pp.267-278. (Pubitemid 44623733)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 23
    • 45749116664 scopus 로고    scopus 로고
    • Sybillimit: A near-optimal social network defense against sybil attacks
    • IEEE
    • Yu, H., Gibbons, P., Kaminsky, M. and Xiao, F. (2008) 'Sybillimit: a near-optimal social network defense against sybil attacks', S&P, IEEE, pp.3-17.
    • (2008) S&P , pp. 3-17
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 24
    • 84863164988 scopus 로고    scopus 로고
    • Authenticating strangers in fast mixing online social networks
    • 5-9 December; Huston, USA
    • Zhao, x., Li, L. and Xue, G. (2011) 'Authenticating strangers in fast mixing online social networks', Globalcom'2011: IEEE Global Communications Conference, 5-9 December; Huston, USA, pp.1637-1642.
    • (2011) Globalcom'2011: Ieee Global Communications Conference , pp. 1637-1642
    • Zhao, X.1    Li, L.2    Xue, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.