메뉴 건너뛰기




Volumn , Issue , 2013, Pages 3003-3011

Checking in without worries: Location privacy in location based social networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL OVERHEADS; CRYPTOGRAPHIC COMPUTATIONS; DYNAMIC FEATURES; HEALTH CONDITION; ITS EFFICIENCIES; LOCATION INFORMATION; LOCATION-BASED SOCIAL NETWORKS; RANDOM ORACLE MODEL;

EID: 84883092889     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2013.6567112     Document Type: Conference Paper
Times cited : (27)

References (25)
  • 2
    • 57349191501 scopus 로고    scopus 로고
    • Supporting anonymous location queries in mobile environments with privacygrid
    • B. Bamba, L. Liu, P. Pesti, and T. Wang, "Supporting anonymous location queries in mobile environments with privacygrid," in WWW, 2008, pp. 237-246.
    • (2008) WWW , pp. 237-246
    • Bamba, B.1    Liu, L.2    Pesti, P.3    Wang, T.4
  • 3
  • 4
    • 38149068986 scopus 로고    scopus 로고
    • Deterministic and efficiently searchable encryption
    • M. Bellare, A. Boldyreva, and A. O'Neill, "Deterministic and efficiently searchable encryption," in CRYPTO, 2007, pp. 535-552.
    • (2007) CRYPTO , pp. 535-552
    • Bellare, M.1    Boldyreva, A.2    O'neill, A.3
  • 6
    • 78650021967 scopus 로고    scopus 로고
    • Algebraic pseudorandom functions with improved efficiency from the augmented cascade
    • D. Boneh, H. W. Montgomery, and A. Raghunathan, "Algebraic pseudorandom functions with improved efficiency from the augmented cascade," in ACM CCS, 2010, pp. 131-140.
    • (2010) ACM CCS , pp. 131-140
    • Boneh, D.1    Montgomery, H.W.2    Raghunathan, A.3
  • 7
    • 38049045519 scopus 로고    scopus 로고
    • Conjunctive, subset, and range queries on encrypted data
    • D. Boneh and B. Waters, "Conjunctive, subset, and range queries on encrypted data," in TCC, 2007, pp. 535-554.
    • (2007) TCC , pp. 535-554
    • Boneh, D.1    Waters, B.2
  • 8
    • 26444507272 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Y.-C. Chang and M. Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data," in ACNS, 2005, pp. 442-455.
    • (2005) ACNS , pp. 442-455
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 9
    • 79960886232 scopus 로고    scopus 로고
    • Secure group key management using uni-directional proxy re-encryption schemes
    • Y.-R. Chen, J. D. Tygar, and W.-G. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in INFOCOM, 2011, pp. 1952-1960.
    • (2011) INFOCOM , pp. 1952-1960
    • Chen, Y.-R.1    Tygar, J.D.2    Tzeng, W.-G.3
  • 10
    • 84883124401 scopus 로고    scopus 로고
    • Crypto++
    • Crypto++, http://www.cryptopp.com/, 2010.
    • (2010)
  • 11
    • 34547240272 scopus 로고    scopus 로고
    • Searchable symmetric encryption: Improved definitions and efficient constructions
    • R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, "Searchable symmetric encryption: improved definitions and efficient constructions," in ACM CCS, 2006, pp. 79-88.
    • (2006) ACM CCS , pp. 79-88
    • Curtmola, R.1    Garay, J.A.2    Kamara, S.3    Ostrovsky, R.4
  • 12
    • 84883105646 scopus 로고    scopus 로고
    • foursquare
    • foursquare, http://blog.foursquare.com/2010/07/01/755614816/, 2010.
    • (2010)
  • 13
  • 16
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in MobiSys, 2003.
    • (2003) MobiSys
    • Gruteser, M.1    Grunwald, D.2
  • 17
    • 48649106117 scopus 로고    scopus 로고
    • Hiding location information from location-based services
    • U. Hengartner, "Hiding location information from location-based services," in MDM, 2007, pp. 268-272.
    • (2007) MDM , pp. 268-272
    • Hengartner, U.1
  • 18
    • 77958056561 scopus 로고    scopus 로고
    • Fast secure computation of set intersection
    • S. Jarecki and X. Liu, "Fast secure computation of set intersection," in SCN, 2010, pp. 418-435.
    • (2010) SCN , pp. 418-435
    • Jarecki, S.1    Liu, X.2
  • 20
    • 37849018331 scopus 로고    scopus 로고
    • Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
    • A. Khoshgozaran and C. Shahabi, "Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy," in SSTD, 2007, pp. 239-257.
    • (2007) SSTD , pp. 239-257
    • Khoshgozaran, A.1    Shahabi, C.2
  • 21
    • 79951509728 scopus 로고    scopus 로고
    • Location privacy: Going beyond k-anonymity, cloaking and anonymizers
    • A. Khoshgozaran, C. Shahabi, and H. Shirani-Mehr, "Location privacy: going beyond k-anonymity, cloaking and anonymizers," Knowl. Inf. Syst., vol. 26, no. 3, pp. 435-465, 2011.
    • (2011) Knowl. Inf. Syst , vol.26 , Issue.3 , pp. 435-465
    • Khoshgozaran, A.1    Shahabi, C.2    Shirani-Mehr, H.3
  • 22
    • 34547720006 scopus 로고    scopus 로고
    • The new casper: Query processing for location services without compromising privacy
    • M. F. Mokbel, C.-Y. Chow, and W. G. Aref, "The new casper: Query processing for location services without compromising privacy," in VLDB, 2006, pp. 763-774.
    • (2006) VLDB , pp. 763-774
    • Mokbel, M.F.1    Chow, C.-Y.2    Aref, W.G.3
  • 24
    • 84861636543 scopus 로고    scopus 로고
    • Achieving usable and privacy-assured similarity search over outsourced cloud data
    • C. Wang, K. Ren, S. Yu, and K. M. R. Urs, "Achieving usable and privacy-assured similarity search over outsourced cloud data," in INFOCOM, 2012, pp. 451-459.
    • (2012) INFOCOM , pp. 451-459
    • Wang, C.1    Ren, K.2    Yu, S.3    Urs, K.M.R.4
  • 25
    • 52649118020 scopus 로고    scopus 로고
    • Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services
    • M. L. Yiu, C. S. Jensen, X. Huang, and H. Lu, "Spacetwist: Managing the trade-offs among location privacy, query performance, and query accuracy in mobile services," in ICDE, 2008, pp. 366-375.
    • (2008) ICDE , pp. 366-375
    • Yiu, M.L.1    Jensen, C.S.2    Huang, X.3    Lu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.