메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Tryst: The Case for Confidential Service Discovery

Author keywords

[No Author keywords available]

Indexed keywords

LOCAL SERVICE; SENSITIVE INFORMATIONS; SERVICE DISCOVERY; SERVICE DISCOVERY MECHANISM; WIRELESS ENVIRONMENT;

EID: 84866369989     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (25)
  • 1
    • 4043116941 scopus 로고    scopus 로고
    • Private authentication
    • M. Abadi and C. Fournet. Private authentication. Theor. Comput. Sci., 322(3):427-476, 2004.
    • (2004) Theor. Comput. Sci. , vol.322 , Issue.3 , pp. 427-476
    • Abadi, M.1    Fournet, C.2
  • 3
    • 14744275332 scopus 로고    scopus 로고
    • Privacy and rationality in individual decision making
    • A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security and Privacy, 3(1):26-33, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 26-33
    • Acquisti, A.1    Grossklags, J.2
  • 4
  • 7
    • 33746040289 scopus 로고    scopus 로고
    • Private encrypted content distribution using private broadcast encryption
    • A. Barth, D. Boneh, and B. Waters. Private encrypted content distribution using private broadcast encryption. In Financial Crypto, 2006.
    • (2006) Financial Crypto
    • Barth, A.1    Boneh, D.2    Waters, B.3
  • 9
    • 35448936042 scopus 로고    scopus 로고
    • Smokescreen: flexible privacy controls for presence-sharing
    • L. P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In MobiSys, 2007.
    • (2007) MobiSys
    • Cox, L.P.1    Dalton, A.2    Marupadi, V.3
  • 11
    • 0001293053 scopus 로고
    • Broadcast encryption
    • A. Fiat and M. Naor. Broadcast encryption. In CRYPTO, 1993.
    • (1993) CRYPTO
    • Fiat, A.1    Naor, M.2
  • 12
    • 70349798920 scopus 로고    scopus 로고
    • Efficient private techniques for verifying social proximity
    • M. J. Freedman and A. Nicolosi. Efficient private techniques for verifying social proximity. In IPTPS, 2007.
    • (2007) IPTPS
    • Freedman, M.J.1    Nicolosi, A.2
  • 13
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • May/June
    • S. Garfinkel, A. Juels, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3(3):34-43, May/June 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.1    Juels, A.2    Pappu, R.3
  • 16
    • 23944520444 scopus 로고    scopus 로고
    • Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
    • M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. ACM MONET, 10, 2005.
    • (2005) ACM MONET , vol.10
    • Gruteser, M.1    Grunwald, D.2
  • 17
    • 35449007284 scopus 로고    scopus 로고
    • Preserving location privacy in wireless LANs
    • T. Jiang, H. Wang, and Y.-C. Hu. Preserving location privacy in wireless LANs. In MobiSys, 2007.
    • (2007) MobiSys
    • Jiang, T.1    Wang, H.2    Hu, Y.-C.3
  • 18
    • 0003387819 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and tracing schemes for stateless receivers. In CRYPTO, 2001.
    • (2001) CRYPTO
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 19
    • 44349164270 scopus 로고    scopus 로고
    • July
    • NGA GEOnet names server, July 2007. http://earth-info.nga.mil/gns/html/index.html.
    • (2007) NGA GEOnet names server
  • 21
    • 85134044782 scopus 로고    scopus 로고
    • Phone pirates in seek and steal mission
    • Aug
    • Phone pirates in seek and steal mission. Cam-bridge Evening News, Aug. 2005. http://www.cambridge-news.co.uk/news/region wide/2005/08/17/06967453-8002-45f8-b520-66b9bed6f29f.lpf.
    • (2005) Cam-bridge Evening News


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.