|
Volumn , Issue , 2012, Pages 447-449
|
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast
|
Author keywords
Android; Bluetooth; Opportunist networks; Secure two party computation
|
Indexed keywords
ANDROID;
HIGH-LEVEL PROGRAMMING;
MILLIONAIRE PROBLEMS;
MOBILE SOCIAL NETWORKS;
NETWORK OPERATIONS;
OPPORTUNISTIC NETWORKS;
PRIVACY PRESERVING;
SECURE TWO-PARTY COMPUTATIONS;
SECURE TWO-PARTY PROTOCOLS;
SET INTERSECTION;
BLUETOOTH;
DATA PRIVACY;
MOBILE COMPUTING;
NETWORK PROTOCOLS;
ROBOTS;
SMARTPHONES;
NETWORK SECURITY;
|
EID: 84866603368
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/2348543.2348607 Document Type: Conference Paper |
Times cited : (11)
|
References (4)
|