-
2
-
-
84860688959
-
Faces of facebook: Privacy in the age of augmented reality
-
A. Acquisti, R. Gross, and F. Stutzman, "Faces of Facebook: Privacy in the Age of Augmented Reality," BlackHat, 2011.
-
(2011)
BlackHat
-
-
Acquisti, A.1
Gross, R.2
Stutzman, F.3
-
4
-
-
84897752593
-
-
Oct
-
"Apple iOS Networking & Internet," http://developer. apple.com/technologies/ios/networking.html, Oct. 2010.
-
(2010)
Apple IOS Networking & Internet
-
-
-
5
-
-
48749092900
-
Whozthat evolving an ecosystem for context-aware mobile social networks
-
July/Aug
-
A. Beach, M. Gartrell, S. Akkala, J. Elston, J. Kelley, K. Nishimoto, B. Ray, S. Razgulin, K. Sundaresan, B. Surendar, M. Terada, and R. Han, "Whozthat? Evolving an Ecosystem for Context-Aware Mobile Social Networks," IEEE Network, vol. 22, no. 4, pp. 50-55, July/Aug. 2008.
-
(2008)
IEEE Network
, vol.22
, Issue.4
, pp. 50-55
-
-
Beach, A.1
Gartrell, M.2
Akkala, S.3
Elston, J.4
Kelley, J.5
Nishimoto, K.6
Ray, B.7
Razgulin, S.8
Sundaresan, K.9
Surendar, B.10
Terada, M.11
Han, R.12
-
7
-
-
84897752594
-
-
Oct
-
Brightkite, http://brightkite.com/, Oct. 2010.
-
(2010)
-
-
-
8
-
-
84897786023
-
-
Bump, https://bu.mp, 2010.
-
(2010)
Bump
-
-
-
9
-
-
78650421160
-
GAnGS: Gather, authenticate 'n group securely
-
C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J.M. McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu, "GAnGS: Gather, Authenticate 'N Group Securely," MobiCom, pp. 92-103. 2008
-
(2008)
MobiCom
, pp. 92-103
-
-
Chen, C.-H.O.1
Chen, C.-W.2
Kuo, C.3
Lai, Y.-H.4
McCune, J.M.5
Studer, A.6
Perrig, A.7
Yang, B.-Y.8
Wu, T.-C.9
-
10
-
-
60149098148
-
D-book: A mobile social networking application for delay tolerant networks
-
R.J. Clark, E. Zasoski, J. Olson, M.H. Ammar, and E.W. Zegura, "D-Book: A Mobile Social Networking Application for Delay Tolerant Networks," Proc. Third ACM Workshop Challenged Networks, pp. 113-116, 2008.
-
(2008)
Proc. Third ACM Workshop Challenged Networks
, pp. 113-116
-
-
Clark, R.J.1
Zasoski, E.2
Olson, J.3
Ammar, M.H.4
Zegura, E.W.5
-
12
-
-
51049122345
-
-
Internet Eng. Task Force, Request for Comments
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (IETF RFC 5280)," Internet Eng. Task Force, Request for Comments, 2008.
-
(2008)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (IETF RFC 5280)
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
13
-
-
33947382369
-
Council regulation (ec) no 2252/2004 of 13 dec. 2004 on standards for security features and biometrics in passports and travel documents issued by member states
-
"Council Regulation (EC) No 2252/2004 of 13 Dec. 2004 on Standards for Security Features and Biometrics in Passports and Travel Documents Issued by Member States," Official J. European Union, vol. 385, pp. 1-6, 2004.
-
(2004)
Official J. European Union
, vol.385
, pp. 1-6
-
-
-
16
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
DOI 10.1109/MPRV.2005.37
-
N. Eagle and A. Pentland, "Social Serendipity: Mobilizing Social Software," IEEE Pervasive Computing, vol. 4, no. 2, pp. 28-34, Jan.-Mar. 2005. (Pubitemid 40750808)
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
17
-
-
84897752595
-
SafeSlinger: An easy-to-use and secure approach for human trust establishment
-
Carnegie Mellon Univ
-
M. Farb, M. Burman, G. Chandok, J. McCune, and A. Perrig, "SafeSlinger: An Easy-to-Use and Secure Approach for Human Trust Establishment," Technical Report CMU-CyLab-11-021, Carnegie Mellon Univ., 2011.
-
(2011)
Technical Report CMU-CyLab-11-021
-
-
Farb, M.1
Burman, M.2
Chandok, G.3
McCune, J.4
Perrig, A.5
-
19
-
-
0029680961
-
Face processing: Human perception and principal components analysis
-
P. Hancock, A. Burton, and V. Bruce, "Face Processing: Human Perception and Principal Components Analysis," Memory and Cognition, vol. 24, pp. 26-40, 1996. (Pubitemid 26036799)
-
(1996)
Memory and Cognition
, vol.24
, Issue.1
, pp. 26-40
-
-
Hancock, P.J.B.1
Burton, A.M.2
Bruce, V.3
-
20
-
-
78149324869
-
Privacy-preserving p2p data sharing with oneswarm
-
T. Isdal, M. Piatek, A. Krishnamurthy, and T.E. Anderson, "Privacy-Preserving P2P Data Sharing with OneSwarm," Proc. ACM SIGCOMM, pp. 111-122, 2010.
-
(2010)
Proc. ACM SIGCOMM
, pp. 111-122
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.E.4
-
21
-
-
59249084348
-
Location-based trust for mobile user-generated content: Applications, challenges and implementations
-
V. Lenders, E. Koukoumidis, P. Zhang, and M. Martonosi, "Location-Based Trust for Mobile User-Generated Content: Applications, Challenges and Implementations," Proc. Ninth Workshop Mobile Computing Systems and Applications (HotMobile '08), pp. 60-64, 2008.
-
(2008)
Proc. Ninth Workshop Mobile Computing Systems and Applications (HotMobile '08)
, pp. 60-64
-
-
Lenders, V.1
Koukoumidis, E.2
Zhang, P.3
Martonosi, M.4
-
22
-
-
68849130156
-
Performance measurements of tor hidden services in low-bandwidth access networks
-
J. Lenhard, K. Loesing, and G. Wirtz, "Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks," Proc. Seventh Int'l Conf. Applied Cryptography and Network Security (ACNS '09), pp. 324-341, 2009.
-
(2009)
Proc. Seventh Int'l Conf. Applied Cryptography and Network Security (ACNS '09)
, pp. 324-341
-
-
Lenhard, J.1
Loesing, K.2
Wirtz, G.3
-
23
-
-
70450239642
-
SPATE: Small-group pki-less authenticated trust establishment
-
Y.-H. Lin, A. Studer, H.-C. Hsiao, J.M. McCune, K.-H. Wang, M. Krohn, P.-L. Lin, A. Perrig, H.-M. Sun, and B.-Y. Yang, "SPATE: Small-Group PKI-Less Authenticated Trust Establishment," Proc. Seventh Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '09), pp. 1-14, 2009.
-
(2009)
Proc. Seventh Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '09)
, pp. 1-14
-
-
Lin, Y.-H.1
Studer, A.2
Hsiao, H.-C.3
McCune, J.M.4
Wang, K.-H.5
Krohn, M.6
Lin, P.-L.7
Perrig, A.8
Sun, H.-M.9
Yang, B.-Y.10
-
24
-
-
84897803038
-
-
Oct
-
Loopt, http://en.wikipedia.org/wiki/Loopt, Oct. 2010.
-
(2010)
Loopt
-
-
-
25
-
-
84936823963
-
Learning to cooperate: Stochastic and tacit collusion in social exchange
-
M. Macy, "Learning to Cooperate: Stochastic and Tacit Collusion in Social Exchange," Am. J. Sociology, vol. 97, no. 3, pp. 808-843, 1991.
-
(1991)
Am. J. Sociology
, vol.97
, Issue.3
, pp. 808-843
-
-
Macy, M.1
-
26
-
-
67650652709
-
We saw each other on the subway: Secure, anonymous proximity-based missed connections
-
J. Manweiler, R. Scudellari, Z. Cancio, and L.P. Cox, "We Saw Each Other on the Subway: Secure, Anonymous Proximity-Based Missed Connections," Proc. 10th Workshop Mobile Computing Systems and Applications (HotMobile '09), pp. 1-6, 2009.
-
(2009)
Proc. 10th Workshop Mobile Computing Systems and Applications (HotMobile '09)
, pp. 1-6
-
-
Manweiler, J.1
Scudellari, R.2
Cancio, Z.3
Cox, L.P.4
-
27
-
-
74049135283
-
SMILE: Encounter- based trust for mobile social services
-
J. Manweiler, R. Scudellari, and L.P. Cox, "SMILE: Encounter-Based Trust for Mobile Social Services," Proc. ACM Conf. Computer and Comm. Security, pp. 246-255, 2009.
-
(2009)
Proc. ACM Conf. Computer and Comm. Security
, pp. 246-255
-
-
Manweiler, J.1
Scudellari, R.2
Cox, L.P.3
-
29
-
-
78650027934
-
Secure encounter-based social networks: Requirements, challenges, and designs
-
A. Mohaisen, E.Y. Vasserman, M. Schuchard, D.F. Kune, and Y. Kim, "Secure Encounter-Based Social Networks: Requirements, Challenges, and Designs," Proc. ACM Conf. Computer and Comm. Security, pp. 717-719, 2010.
-
(2010)
Proc. ACM Conf. Computer and Comm. Security
, pp. 717-719
-
-
Mohaisen, A.1
Vasserman, E.Y.2
Schuchard, M.3
Kune, D.F.4
Kim, Y.5
-
30
-
-
84995476635
-
MobiClique: Middleware for mobile social networking
-
A.-K. Pietiläinen, E. Oliver, J. LeBrun, G. Varghese, and C. Diot, "MobiClique: Middleware for Mobile Social Networking," Proc. Second ACM Workshop Online Social Networks (WOSN '09), pp. 49-54, 2009.
-
(2009)
Proc. Second ACM Workshop Online Social Networks (WOSN '09)
, pp. 49-54
-
-
Pietiläinen, A.-K.1
Oliver, E.2
Lebrun, J.3
Varghese, G.4
Diot, C.5
-
31
-
-
0010602889
-
-
technical report, MIT, Cambridge
-
R.L. Rivest, A. Shamir, and D.A. Wagner, "Time-Lock Puzzles and Timed-Release Crypto," technical report, MIT, Cambridge, 1996.
-
(1996)
Time-Lock Puzzles and Timed-Release Crypto
-
-
Rivest, R.L.1
Shamir, A.2
Wagner, D.A.3
-
33
-
-
84855682684
-
Don't bump, shake on it: The exploitation of a popular accelerometer-based smart phone exchange and its secure replacement
-
A. Studer, T. Passaro, and L. Bauer, "Don't Bump, Shake on It: The Exploitation of a Popular Accelerometer-Based Smart Phone Exchange and its Secure Replacement," Proc. 27th Ann. Computer Security Applications Conf. (ACSAC '11), pp. 333-342, 2011.
-
(2011)
Proc. 27th Ann. Computer Security Applications Conf. (ACSAC '11)
, pp. 333-342
-
-
Studer, A.1
Passaro, T.2
Bauer, L.3
-
34
-
-
56749173469
-
VENETA: Serverless friend-of-friend detection in mobile social networking
-
M. von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '08), pp. 184-189, 2008.
-
(2008)
Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '08)
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
|