-
1
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, Secure Friend Discovery in Mobile Social Networks, Proc. IEEE INFOCOM, pp. 1647-1655, 2011.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
2
-
-
84866932546
-
Seer: A secure and efficient service review system for service-oriented mobile social networks
-
X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, Seer: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks, Proc. IEEE 32nd Int'l Conf. Distributed Computing Systems (ICDCS), pp. 647-656, 2012.
-
(2012)
Proc. IEEE 32nd Int'l Conf. Distributed Computing Systems (ICDCS)
, pp. 647-656
-
-
Liang, X.1
Li, X.2
Lu, R.3
Lin, X.4
Shen, X.5
-
3
-
-
84866513570
-
Morality-driven data forwarding with privacy preservation in mobile social networks
-
Sept.
-
X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen, Morality-Driven Data Forwarding with Privacy Preservation in Mobile Social Networks, IEEE Trans. Vehicular Technology, vol. 61, no. 7, pp. 3209-3222, Sept. 2012.
-
(2012)
IEEE Trans. Vehicular Technology
, vol.61
, Issue.7
, pp. 3209-3222
-
-
Liang, X.1
Li, X.2
Luan, T.3
Lu, R.4
Lin, X.5
Shen, X.6
-
4
-
-
80052799327
-
Vtube: Towards the media rich city life with autonomous vehicular content distribution
-
T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai, VTube: Towards the Media Rich City Life with Autonomous Vehicular Content Distribution, Proc. IEEE CS Eighth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. Networks (SECON), pp. 359-367, 2011.
-
(2011)
Proc. IEEE CS Eighth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. Networks (SECON)
, pp. 359-367
-
-
Luan, T.H.1
Cai, L.X.2
Chen, J.3
Shen, X.4
Bai, F.5
-
6
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D.X. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN), pp. 259-268, 2004.
-
(2004)
Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN)
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
7
-
-
77953317298
-
Sybil attacks against mobile users: Friends and foes to the rescue
-
D. Quercia and S. Hailes, Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue, Proc. IEEE INFOCOM, pp. 336-340, 2010.
-
(2010)
Proc. IEEE INFOCOM
, pp. 336-340
-
-
Quercia, D.1
Hailes, S.2
-
8
-
-
84857789593
-
A dynamic privacy-preserving key management scheme for location-based services in vanets
-
Mar
-
R. Lu, X. Lin, X. Liang, and X. Shen, A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs, IEEE Trans. Intelligent Transportation Systems, vol. 13, no. 1, pp. 127-139, Mar. 2012.
-
(2012)
IEEE Trans. Intelligent Transportation Systems
, vol.13
, Issue.1
, pp. 127-139
-
-
Lu, R.1
Lin, X.2
Liang, X.3
Shen, X.4
-
9
-
-
84856182115
-
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
-
Jan.
-
R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs, IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan. 2012.
-
(2012)
IEEE Trans. Vehicular Technology
, vol.61
, Issue.1
, pp. 86-96
-
-
Lu, R.1
Lin, X.2
Luan, T.3
Liang, X.4
Shen, X.5
-
11
-
-
38149076425
-
Short group signature without random oracles
-
X. Liang, Z. Cao, J. Shao, and H. Lin, Short Group Signature without random Oracles, Proc. Ninth Int'l Conf. Information and Comm. Security (ICICS), pp. 69-82, 2007.
-
(2007)
Proc. Ninth Int'l Conf. Information and Comm. Security (ICICS)
, pp. 69-82
-
-
Liang, X.1
Cao, Z.2
Shao, J.3
Lin, H.4
-
12
-
-
33745849655
-
Identity-based aggregate signatures
-
DOI 10.1007/11745853-17, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings LNCS
-
C. Gentry and Z. Ramzan, Identity-Based Aggregate Signatures, Proc. Int'l Conf. Public Key Cryptography, pp. 257-273, 2006. (Pubitemid 44029586)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3958
, pp. 257-273
-
-
Gentry, C.1
Ramzan, Z.2
-
13
-
-
78751639836
-
Adaptive location-oriented content delivery in delay-sensitive pervasive applications
-
Mar
-
Y. Zhang, Z. Wu, and W. Trappe, Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications, IEEE Trans. Mobile Computing, vol. 10, no. 3, pp. 362-376, Mar. 2011.
-
(2011)
IEEE Trans. Mobile Computing
, vol.10
, Issue.3
, pp. 362-376
-
-
Zhang, Y.1
Wu, Z.2
Trappe, W.3
-
14
-
-
64049112040
-
Service discovery in mobile ad hoc networks based on grid
-
Mar
-
H. Tsai, T. Chen, and C. Chu, Service Discovery in Mobile Ad Hoc Networks Based on Grid, IEEE Trans. Vehicular Technology, vol. 58, no. 3, pp. 1528-1545, Mar. 2009.
-
(2009)
IEEE Trans. Vehicular Technology
, vol.58
, Issue.3
, pp. 1528-1545
-
-
Tsai, H.1
Chen, T.2
Chu, C.3
-
15
-
-
84870434696
-
Toward privacy preserving and collusion resistance in a location proof updating system
-
Jan
-
Z. Zhu and G. Cao, Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System, IEEE Trans. Mobile Computing, vol. 12, no. 1, pp. 51-64, Jan. 2013.
-
(2013)
IEEE Trans. Mobile Computing
, vol.12
, Issue.1
, pp. 51-64
-
-
Zhu, Z.1
Cao, G.2
-
16
-
-
70350266232
-
Factors affecting the online travel buying decision: A review
-
I. Wen, Factors Affecting the Online Travel Buying Decision: A Review, Int'l J. Contemporary Hospitality Management, vol. 21, no. 6, pp. 752-765, 2009.
-
(2009)
Int'l J. Contemporary Hospitality Management
, vol.21
, Issue.6
, pp. 752-765
-
-
Wen, I.1
-
17
-
-
67650211063
-
Tisa: Toward trustworthy services in a service-oriented architecture
-
Oct -Dec
-
H. Rajan and M. Hosamani, Tisa: Toward Trustworthy Services in a Service-Oriented Architecture, IEEE Trans. Services Computing, vol. 1, no. 4, pp. 201-213, Oct.-Dec. 2008.
-
(2008)
IEEE Trans. Services Computing
, vol.1
, Issue.4
, pp. 201-213
-
-
Rajan, H.1
Hosamani, M.2
-
18
-
-
81455142681
-
Two-dimensional trust rating aggregations in service-oriented applications
-
Oct-Dec
-
Y. Wang and L. Li, Two-Dimensional Trust Rating Aggregations in Service-Oriented Applications, IEEE Trans. Service Computing, vol. 4, no. 4, pp. 257-271, Oct.-Dec. 2011.
-
(2011)
IEEE Trans. Service Computing
, vol.4
, Issue.4
, pp. 257-271
-
-
Wang, Y.1
Li, L.2
-
19
-
-
84858666726
-
Iterative trust and reputation management using belief propagation
-
May/June
-
E. Ayday and F. Fekri, Iterative Trust and Reputation Management Using Belief Propagation, IEEE Trans. Dependable and Secure Computing, vol. 9, no. 3, pp. 375-386, May/June 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.3
, pp. 375-386
-
-
Ayday, E.1
Fekri, F.2
-
20
-
-
84856255130
-
Securedtrust: A dynamic trust computation model for secured communication in multiagent systems
-
Mar/Ar
-
A. Das and M.M. Islam, SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems, IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 261-274, Mar./Apr. 2012.
-
(2012)
IEEE Trans. Dependable and Secure Computing
, vol.9
, Issue.2
, pp. 261-274
-
-
Das, A.1
Islam, M.M.2
-
22
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
DOI 10.1016/S1570-8705(03)00008-8
-
C. Karlof and D. Wagner, Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, Ad Hoc Networks, vol. 1, no. 2/3, pp. 293-315, 2003. (Pubitemid 40421415)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
23
-
-
78149337076
-
An analysis of social network-based sybil defenses
-
B. Viswanath, A. Post, P.K. Gummadi, and A. Mislove, An Analysis of Social Network-Based Sybil Defenses, Proc. ACM SIGCOMM, pp. 363-374, 2010.
-
(2010)
Proc. ACM SIGCOMM
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, P.K.3
Mislove, A.4
-
24
-
-
79960871268
-
Keep your friends close: Incorporating trust into social network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim, Keep Your Friends Close: Incorporating Trust into Social Network-Based Sybil Defenses, Proc. IEEE INFOCOM, pp. 1943-1951, 2011.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1943-1951
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
25
-
-
84861603155
-
Sybildefender: Defend against sybil attacks in large social networks
-
W. Wei, F. Xu, C.C. Tan, and Q. Li, Sybildefender: Defend Against Sybil Attacks in Large Social Networks, Proc. IEEE INFOCOM, pp. 1951-1959, 2012.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1951-1959
-
-
Wei, W.1
Xu, F.2
Tan, C.C.3
Li, Q.4
-
26
-
-
78249265471
-
-
Social Group
-
Social Group,Wikipedia, http://en.wikipedia.org/wiki/Social-group, 2013.
-
(2013)
Wikipedia
-
-
-
27
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M.K. Franklin, Identity-Based Encryption from the Weil Pairing, Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO), pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
84927727752
-
Security proofs for signature schemes
-
D. Pointcheval and J. Stern, Security Proofs for Signature Schemes, Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 387-398, 1996. (Pubitemid 126071081)
-
(1996)
Lecture Notes in Computer Science
, Issue.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
29
-
-
24944566040
-
Efficient Identity-Based Encryption without random oracles
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
B. Waters, Efficient Identity-Based Encryption without random Oracles, Proc. Int'l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT), pp. 114-127, 2005. (Pubitemid 41313949)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 114-127
-
-
Waters, B.1
-
31
-
-
84862772856
-
Mobility prediction based neighborhood discovery for mobile ad hoc networks
-
X. Li, N. Mitton, and D. Simplot-Ryl, Mobility Prediction Based Neighborhood Discovery for Mobile Ad Hoc Networks, Proc. IFIP Int'l Conf. Networking (NETWORKING), pp. 138-151, 2011.
-
(2011)
Proc. IFIP Int'l Conf. Networking (NETWORKING)
, pp. 138-151
-
-
Li, X.1
Mitton, N.2
Simplot-Ryl, D.3
|