메뉴 건너뛰기




Volumn 7397 LNCS, Issue , 2012, Pages 73-88

Efficient private proximity testing with GSM location sketches

Author keywords

[No Author keywords available]

Indexed keywords

GSM CELLULAR NETWORKS; MOBILE USERS; NEW SOURCES; ORDERS OF MAGNITUDE; PHYSICAL PROXIMITY; PRIVACY PRESERVING; REPRODUCIBILITIES; SET INTERSECTION; TAG-BASED; THIRD PARTIES;

EID: 84865823964     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32946-3_7     Document Type: Conference Paper
Times cited : (29)

References (27)
  • 1
    • 77951187028 scopus 로고    scopus 로고
    • Gsmworld -market data summary (2009), http://www.gsmworld.com/newsroom/ market-data/market data summary.html
    • (2009) Gsmworld -Market Data Summary
  • 4
    • 18744416146 scopus 로고    scopus 로고
    • 3GPP. TS 04.08, 3rd Generation Partnership Project (3GPP) January
    • 3GPP. Mobile radio interface layer 3 specification. TS 04.08, 3rd Generation Partnership Project (3GPP) (January 2004)
    • (2004) Mobile Radio Interface Layer 3 Specification
  • 5
    • 84862167734 scopus 로고    scopus 로고
    • 3GPP. TS 23.002, 3rd Generation Partnership Project (3GPP) March
    • 3GPP. Network architecture. TS 23.002, 3rd Generation Partnership Project (3GPP) (March 2011)
    • (2011) Network Architecture
  • 6
    • 84958035648 scopus 로고    scopus 로고
    • Secure Multi-party Computational Geometry
    • Dehne, F., Sack, J.- R., Tamassia, R. (eds.) WADS 2001. Springer, Heidelberg
    • Atallah, M.J., Du, W.: Secure Multi-party Computational Geometry. In: Dehne, F., Sack, J.- R., Tamassia, R. (eds.) WADS 2001. LNCS, vol. 2125, pp. 165-179. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2125 , pp. 165-179
    • Atallah, M.J.1    Du, W.2
  • 7
    • 2942524994 scopus 로고    scopus 로고
    • Piscataway, NJ, USA, IEEE Educational Activities Department (January)
    • Beresford, A.R., Stajano, F.: Location privacy in pervasive computing, Piscataway, NJ, USA, vol. 2, pp. 46-55. IEEE Educational Activities Department (January 2003)
    • (2003) Location Privacy in Pervasive Computing , vol.2 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 8
    • 79956075292 scopus 로고    scopus 로고
    • Identifying and Filtering Near-Duplicate Documents
    • Giancarlo, R., Sankoff, D. (eds.) CPM 2000. Springer, Heidelberg
    • Broder, A.: Identifying and Filtering Near-Duplicate Documents. In: Giancarlo, R., Sankoff, D. (eds.) CPM 2000. LNCS, vol. 1848, pp. 1-10. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1848 , pp. 1-10
    • Broder, A.1
  • 9
    • 0010362121 scopus 로고    scopus 로고
    • Syntactic clustering of the web
    • Papers from the Sixth International World Wide Web Conference
    • Broder, A.Z., Glassman, S.C., Manasse, M.S., Zweig, G.: Syntactic clustering of the web. Computer Networks and ISDN Systems 29(8-13), 1157-1166 (1997); Papers from the Sixth International World Wide Web Conference
    • (1997) Computer Networks and ISDN Systems , vol.29 , Issue.8-13 , pp. 1157-1166
    • Broder, A.Z.1    Glassman, S.C.2    Manasse, M.S.3    Zweig, G.4
  • 10
    • 77955318017 scopus 로고    scopus 로고
    • Practical Private Set Intersection Protocols with Linear Complexity
    • Sion,R. (ed.) FC2010. Springer,Heidelberg
    • De Cristofaro, E., Tsudik, G.: Practical Private Set Intersection Protocols with Linear Complexity. In: Sion,R. (ed.) FC2010.LNCS, vol. 6052, pp. 143-159. Springer,Heidelberg (2010)
    • (2010) LNCS , vol.6052 , pp. 143-159
    • De Cristofaro, E.1    Tsudik, G.2
  • 12
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • Fagin, R., Naor, M.,Winkler, P.: Comparing information without leaking it. Commun. ACM, 77-85 (1996)
    • (1996) Commun. ACM , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 13
    • 35048820609 scopus 로고    scopus 로고
    • Efficient Private Matching and Set Intersection
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Freedman, M.J., Nissim, K., Pinkas, B.: Efficient Private Matching and Set Intersection. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 1-19. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 1-19
    • Freedman, M.J.1    Nissim, K.2    Pinkas, B.3
  • 15
    • 40249108370 scopus 로고    scopus 로고
    • Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
    • Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
    • Hazay, C., Lindell, Y.: Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 155-175. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4948 , pp. 155-175
    • Hazay, C.1    Lindell, Y.2
  • 16
    • 79955547393 scopus 로고    scopus 로고
    • Efficient Set Operations in the Presence of Malicious Adversaries
    • Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. Springer, Heidelberg
    • Hazay, C., Nissim, K.: Efficient Set Operations in the Presence of Malicious Adversaries. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 312-331. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6056 , pp. 312-331
    • Hazay, C.1    Nissim, K.2
  • 18
    • 0001368373 scopus 로고
    • Étude comparative de la distribution florale dans une portion des Alpes et des Jura
    • Jaccard, P.: Étude comparative de la distribution florale dans une portion des Alpes et des Jura. Bulletin del la Société Vaudoise des Sciences Naturelles 37, 547-579 (1901)
    • (1901) Bulletin del la Société Vaudoise des Sciences Naturelles , vol.37 , pp. 547-579
    • Jaccard, P.1
  • 19
    • 70350656283 scopus 로고    scopus 로고
    • Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection
    • Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 577-594. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 577-594
    • Jarecki, S.1    Liu, X.2
  • 20
    • 77958056561 scopus 로고    scopus 로고
    • Fast Secure Computation of Set Intersection
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Jarecki, S., Liu, X.: Fast Secure Computation of Set Intersection. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 418-435. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 21
    • 33745160750 scopus 로고    scopus 로고
    • Privacy-Preserving Set Operations
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Kissner, L., Song, D.: Privacy-Preserving Set Operations. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 241-257. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 241-257
    • Kissner, L.1    Song, D.2
  • 27
    • 38149079700 scopus 로고    scopus 로고
    • Louis, Lester and Pierre: Three Protocols for Location Privacy
    • Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
    • Zhong, G., Goldberg, I., Hengartner, U.: Louis, Lester and Pierre: Three Protocols for Location Privacy. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 62-76. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4776 , pp. 62-76
    • Zhong, G.1    Goldberg, I.2    Hengartner, U.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.