-
1
-
-
84883359481
-
-
"Comscore," http://www.comscoredatamine.com/.
-
Comscore
-
-
-
2
-
-
38349017073
-
Exploiting social interactions in mobile systems
-
A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, P. K. Gummadi, and E. de Lara, "Exploiting social interactions in mobile systems," in Ubicomp, 2007, pp. 409-428.
-
(2007)
Ubicomp
, pp. 409-428
-
-
Miklas, A.G.1
Gollu, K.K.2
Chan, K.K.W.3
Saroiu, S.4
Gummadi, P.K.5
De Lara, E.6
-
3
-
-
70349678474
-
Optimal and scalable distribution of content updates over a mobile social network
-
S. Ioannidis, A. Chaintreau, and L. Massoulié, "Optimal and scalable distribution of content updates over a mobile social network," in Proc. IEEE INFOCOM, 2009, pp. 1422-1430.
-
(2009)
Proc. IEEE INFOCOM
, pp. 1422-1430
-
-
Ioannidis, S.1
Chaintreau, A.2
Massoulié, L.3
-
4
-
-
77953313061
-
Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
R. Lu, X. Lin, and X. Shen, "Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks," in Proc. IEEE INFOCOM, 2010, pp. 632-640.
-
(2010)
Proc. IEEE INFOCOM
, pp. 632-640
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
5
-
-
77953985250
-
Message propagation in adhoc-based proximity mobile social networks
-
W. He, Y. Huang, K. Nahrstedt, and B. Wu, "Message propagation in adhoc-based proximity mobile social networks," in PERCOM workshops, 2010, pp. 141-146.
-
(2010)
PERCOM Workshops
, pp. 141-146
-
-
He, W.1
Huang, Y.2
Nahrstedt, K.3
Wu, B.4
-
6
-
-
79955976020
-
Controlled coalitional games for cooperative mobile social networks
-
D. Niyato, P.Wang, W. Saad, and A. Hjørungnes, "Controlled coalitional games for cooperative mobile social networks," IEEE Trans. Veh. Technol., vol. 60, no. 4, pp. 1812-1824, 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.60
, Issue.4
, pp. 1812-1824
-
-
Niyato, D.1
Wang, P.2
Saad, W.3
Hjørungnes, A.4
-
7
-
-
32144441510
-
Peoplenet: Engineering a wireless virtual social network
-
M. Motani, V. Srinivasan, and P. Nuggehalli, "Peoplenet: engineering a wireless virtual social network," in MobiCom, 2005, pp. 243-257.
-
(2005)
MobiCom
, pp. 243-257
-
-
Motani, M.1
Srinivasan, V.2
Nuggehalli, P.3
-
8
-
-
77953012284
-
Designing participation in agile ridesharing with mobile social software
-
M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, "Designing participation in agile ridesharing with mobile social software," in OZCHI, 2009, pp. 257-260.
-
(2009)
OZCHI
, pp. 257-260
-
-
Brereton, M.1
Roe, P.2
Foth, M.3
Bunker, J.M.4
Buys, L.5
-
9
-
-
84869471781
-
Exploiting friendship relations for efficient routing in delay tolerant mobile social networks
-
E.Bulut and B.Szymanski, "Exploiting friendship relations for efficient routing in delay tolerant mobile social networks," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 12, pp. 2254-2265, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.12
, pp. 2254-2265
-
-
Bulut, E.1
Szymanski, B.2
-
10
-
-
77955912474
-
E-smalltalker: A distributed mobile system for social networking in physical proximity
-
Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in ICDCS, 2010, pp. 468-477.
-
(2010)
ICDCS
, pp. 468-477
-
-
Yang, Z.1
Zhang, B.2
Dai, J.3
Champion, A.C.4
Xuan, D.5
Li, D.6
-
11
-
-
77953319755
-
Routing in socially selfish delay tolerant networks
-
Q. Li, S. Zhu, and G. Cao, "Routing in socially selfish delay tolerant networks," in Proc. IEEE INFOCOM, 2010, pp. 857-865.
-
(2010)
Proc. IEEE INFOCOM
, pp. 857-865
-
-
Li, Q.1
Zhu, S.2
Cao, G.3
-
12
-
-
84866513570
-
Moralitydriven data forwarding with privacy preservation in mobile social networks
-
X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, and X. Shen, "Moralitydriven data forwarding with privacy preservation in mobile social networks," IEEE Trans. Veh. Technol., vol. 7, no. 61, pp. 3209-3222, 2012.
-
(2012)
IEEE Trans. Veh. Technol.
, vol.7
, Issue.61
, pp. 3209-3222
-
-
Liang, X.1
Li, X.2
Luan, T.H.3
Lu, R.4
Lin, X.5
Shen, X.6
-
13
-
-
33749016498
-
Information revelation and privacy in online social networks
-
R. Gross, A. Acquisti, and H. J. H. III, "Information revelation and privacy in online social networks," in WPES, 2005, pp. 71-80.
-
(2005)
WPES
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
Ho III, J.H.3
-
14
-
-
37249010231
-
An evaluation of identity-sharing behavior in social network communities
-
F. Stutzman, "An evaluation of identity-sharing behavior in social network communities." iDMAa Journal, vol. 3, no. 1, pp. 10-18, 2006.
-
(2006)
IDMAa Journal
, vol.3
, Issue.1
, pp. 10-18
-
-
Stutzman, F.1
-
15
-
-
76749094667
-
Starclique: Guaranteeing user privacy in social networks against intersection attacks
-
K. P. N. Puttaswamy, A. Sala, and B. Y. Zhao, "Starclique: guaranteeing user privacy in social networks against intersection attacks," in CoNEXT, 2009, pp. 157-168.
-
(2009)
CoNEXT
, pp. 157-168
-
-
Puttaswamy, K.P.N.1
Sala, A.2
Zhao, B.Y.3
-
16
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in WWW, 2009, pp. 531-540.
-
(2009)
WWW
, pp. 531-540
-
-
Zheleva, E.1
Getoor, L.2
-
18
-
-
0038487086
-
Secret handshakes from pairing-based key agreements
-
D. Balfanz, G. Durfee, N. Shankar, D. K. Smetters, J. Staddon, and H.-C. Wong, "Secret handshakes from pairing-based key agreements," in IEEE Symposium on Security and Privacy, 2003, pp. 180-196.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.K.4
Staddon, J.5
Wong, H.-C.6
-
19
-
-
35048820609
-
Efficient private matching and set intersection
-
M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection," in EUROCRYPT, 2004, pp. 1-19.
-
(2004)
EUROCRYPT
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
20
-
-
84855674646
-
A secure handshake scheme with symptoms-matching for mhealthcare social network
-
R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," ACM Mobile Networks and Applications (MONET), vol. 16, no. 6, pp. 683-694, 2011.
-
(2011)
ACM Mobile Networks and Applications (MONET)
, vol.16
, Issue.6
, pp. 683-694
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
21
-
-
79960878565
-
Findu: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou, "Findu: Privacy-preserving personal profile matching in mobile social networks," in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
22
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking," in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1969-1977
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
23
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks," in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
24
-
-
74049097109
-
On noncooperative location privacy: A game-theoretic analysis
-
J. Freudiger, M. H. Manshaei, J.-P. Hubaux, and D. C. Parkes, "On noncooperative location privacy: a game-theoretic analysis," in ACM CCS, 2009, pp. 324-337.
-
(2009)
ACM CCS
, pp. 324-337
-
-
Freudiger, J.1
Manshaei, M.H.2
Hubaux, J.-P.3
Parkes, D.C.4
-
25
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
R. Lu, X. Lin, H. Luan, X. Liang, and X. Shen, "Pseudonym changing at social spots: An effective strategy for location privacy in vanets," IEEE Trans. Veh. Technol., vol. 61, no. 1, pp. 86 -96, 2011.
-
(2011)
IEEE Trans. Veh. Technol.
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, H.3
Liang, X.4
Shen, X.5
-
26
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in EUROCRYPT, 2008, pp. 146-162.
-
(2008)
EUROCRYPT
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
27
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
N. Eagle and A. Pentland, "Social serendipity: mobilizing social software," IEEE Pervasive Computing, vol. 4, no. 2, pp. 28-34, 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
28
-
-
80051898247
-
E-shadow: Lubricating social interaction using mobile phones
-
J. Teng, B. Zhang, X. Li, X. Bai, and D. Xuan, "E-shadow: Lubricating social interaction using mobile phones," in ICDCS, 2011, pp. 909-918.
-
ICDCS
, vol.2011
, pp. 909-918
-
-
Teng, J.1
Zhang, B.2
Li, X.3
Bai, X.4
Xuan, D.5
-
29
-
-
84863557627
-
Your friends have more friends than you do: Identifying influential mobile users through random walks
-
B. Han and A. Srinivasan, "Your friends have more friends than you do: identifying influential mobile users through random walks," in MobiHoc, 2012, pp. 5-14.
-
MobiHoc
, vol.2012
, pp. 5-14
-
-
Han, B.1
Srinivasan, A.2
-
30
-
-
77955912474
-
E-smalltalker: A distributed mobile system for social networking in physical proximity
-
Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity," in ICDCS, 2010, pp. 468-477.
-
(2010)
ICDCS
, pp. 468-477
-
-
Yang, Z.1
Zhang, B.2
Dai, J.3
Champion, A.C.4
Xuan, D.5
Li, D.6
-
31
-
-
33745160750
-
Privacy-preserving set operations
-
L. Kissner and D. X. Song, "Privacy-preserving set operations," in CRYPTO, 2005, pp. 241-257.
-
(2005)
CRYPTO
, pp. 241-257
-
-
Kissner, L.1
Song, D.X.2
-
32
-
-
41549155611
-
Distributed private matching and set operations
-
Q. Ye, H. Wang, and J. Pieprzyk, "Distributed private matching and set operations," in ISPEC, 2008, pp. 347-360.
-
(2008)
ISPEC
, pp. 347-360
-
-
Ye, Q.1
Wang, H.2
Pieprzyk, J.3
-
33
-
-
68949136946
-
Efficient robust private set intersection
-
D. Dachman-Soled, T. Malkin, M. Raykova, and M. Yung, "Efficient robust private set intersection," in ACNS, 2009, pp. 125-142.
-
(2009)
ACNS
, pp. 125-142
-
-
Dachman-Soled, D.1
Malkin, T.2
Raykova, M.3
Yung, M.4
-
34
-
-
70350656283
-
Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection
-
S. Jarecki and X. Liu, "Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection," in TCC, 2009, pp. 577-594.
-
(2009)
TCC
, pp. 577-594
-
-
Jarecki, S.1
Liu, X.2
-
35
-
-
77954759544
-
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries
-
C. Hazay and Y. Lindell, "Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries," J. Cryptology, vol. 23, no. 3, pp. 422-456, 2010.
-
(2010)
J. Cryptology
, vol.23
, Issue.3
, pp. 422-456
-
-
Hazay, C.1
Lindell, Y.2
-
36
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikainen, "On private scalar product computation for privacy-preserving data mining," in ICISC, 2004, pp. 104-120.
-
(2004)
ICISC
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikainen, T.4
-
37
-
-
0020312165
-
Protocols for secure computations (extended abstract)
-
A. C.-C. Yao, "Protocols for secure computations (extended abstract)," in FOCS, 1982, pp. 160-164.
-
(1982)
FOCS
, pp. 160-164
-
-
Yao, A.C.-C.1
-
38
-
-
0023545076
-
How to play any mental game or a completeness theorem for protocols with honest majority
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game or a completeness theorem for protocols with honest majority," in STOC, 1987, pp. 218-229.
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
39
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
I. Ioannidis, A. Grama, and M. J. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments," in ICPP, 2002, pp. 379-384.
-
(2002)
ICPP
, pp. 379-384
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.J.3
-
40
-
-
35048846561
-
Strong conditional oblivious transfer and computing on intervals
-
I. F. Blake and V. Kolesnikov, "Strong conditional oblivious transfer and computing on intervals," in ASIACRYPT, 2004, pp. 515-529.
-
(2004)
ASIACRYPT
, pp. 515-529
-
-
Blake, I.F.1
Kolesnikov, V.2
-
41
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
-
(1999)
EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
42
-
-
80955157888
-
Can homomorphic encryption be practical?
-
M. Naehrig, K. Lauter, and V. Vaikuntanathan, "Can homomorphic encryption be practical?" in CCSW, 2011, pp. 113-124.
-
(2011)
CCSW
, pp. 113-124
-
-
Naehrig, M.1
Lauter, K.2
Vaikuntanathan, V.3
-
43
-
-
84864583229
-
Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
-
R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, "Eppa: An efficient and privacy-preserving aggregation scheme for secure smart grid communications," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1621-1631, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.9
, pp. 1621-1631
-
-
Lu, R.1
Liang, X.2
Li, X.3
Lin, X.4
Shen, X.5
-
45
-
-
84861648316
-
Exploiting prediction to enable secure and reliable routing in wireless body area networks
-
X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, and W. Zhuang, "Exploiting prediction to enable secure and reliable routing in wireless body area networks," in Proc. IEEE INFOCOM, 2012, pp. 388-396.
-
(2012)
Proc. IEEE INFOCOM
, pp. 388-396
-
-
Liang, X.1
Li, X.2
Shen, Q.3
Lu, R.4
Lin, X.5
Shen, X.6
Zhuang, W.7
-
46
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
47
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A model for protecting privacy," International J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
International J. Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
48
-
-
77955106876
-
-
Jan.
-
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, "CRAWDAD trace cambridge/haggle/imote/infocom (v. 2006-01-31)," Jan. 2006.
-
(2006)
CRAWDAD Trace Cambridge/haggle/imote/infocom (V. 2006-01-31)
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
49
-
-
85044912675
-
Small worlds: The dynamics of networks between order and randomness
-
D. J. Watts, "Small worlds: The dynamics of networks between order and randomness," J. Artificial Societies and Social Simulation, vol. 6, no. 2, 2003.
-
(2003)
J. Artificial Societies and Social Simulation
, vol.6
, Issue.2
-
-
Watts, D.J.1
-
50
-
-
84976668743
-
Finding all cliques of an undirected graph (algorithm 457)
-
C. Bron and J. Kerbosch, "Finding all cliques of an undirected graph (algorithm 457)," Commun. ACM, vol. 16, no. 9, pp. 575-576, 1973. of Canada
-
(1973)
Commun. ACM
, vol.16
, Issue.9
, pp. 575-576
-
-
Bron, C.1
Kerbosch, J.2
|