메뉴 건너뛰기




Volumn , Issue , 2013, Pages 47-65

Encryption for peer-to-peer social networks

Author keywords

Broadcast encryption; Encryption based access control; P2P social network; Predicate encryption

Indexed keywords

ACCESS CONTROL; DIGITAL STORAGE; NETWORK SECURITY; PEER TO PEER NETWORKS; SOCIAL NETWORKING (ONLINE);

EID: 84906820020     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-1-4614-4139-7_4     Document Type: Chapter
Times cited : (16)

References (30)
  • 1
    • 84856190322 scopus 로고    scopus 로고
    • Access control in a peer-to-peer social network. Master’s thesis
    • Lausanne, Switzerland
    • Afify Y (2008) Access control in a peer-to-peer social network. Master’s thesis, EPFL, Lausanne, Switzerland
    • (2008) EPFL
    • Afify, Y.1
  • 3
    • 70450257780 scopus 로고    scopus 로고
    • Persona: An online social network with user-defined privacy
    • Baden R, Bender A, Spring N, Bhattacharjee B, Starin D. (2009) Persona: an online social network with user-defined privacy. SIGCOMM Comput Commun Rev 39:135-146. http://doi. acm.org/10.1145/1594977.1592585
    • (2009) SIGCOMM Comput Commun , vol.39 , pp. 135-146
    • Baden, R.1    Bender, A.2    Spring, N.3    Bhattacharjee, B.4    Starin, D.5
  • 4
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • symposium on security and privacy, SP’07, Berkeley, IEEE Computer Society, Los Alamitos
    • Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 I.E. symposium on security and privacy, SP’07, Berkeley. IEEE Computer Society, Los Alamitos, pp 321-334. http://dx.doi.org/10.1109/SP.2007.11
    • (2007) Proceedings of the 2007 I.E , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 6
    • 72949088489 scopus 로고    scopus 로고
    • Safebook: A privacy-preserving online social network leveraging on real-life trust
    • Cutillo L, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. Commun Mag IEEE 47(12):94-101
    • (2009) Commun Mag IEEE , vol.47 , Issue.12 , pp. 94-101
    • Cutillo, L.1    Molva, R.2    Strufe, T.3
  • 8
    • 57949110628 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • Springer, Berlin/Heidelberg
    • Delerablee C (2007) Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Advances in cryptology ASIACRYPT 2007. Lecture notes in computer science, vol 4833. Springer, Berlin/Heidelberg, pp 200-215
    • (2007) Advances in Cryptology ASIACRYPT 2007. Lecture Notes in computer science , vol.4833 , pp. 200-215
    • Delerablee, C.1
  • 25
    • 0003618441 scopus 로고    scopus 로고
    • Report on the development of the advanced encryption standard (Aes)
    • Technical report MSU-CSE-99-39, Information Technology Laboratory, National Institute of Standards and Technology
    • Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (2000) Report on the development of the advanced encryption standard (aes). Technical report MSU-CSE-99-39, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology. http://csrc.nist.gov/archive/aes/round2/r2report.pdf
    • (2000) Computer Security Division
    • Nechvatal, J.1    Barker, E.2    Bassham, L.3    Burr, W.4    Dworkin, M.5    Foti, J.6    Roback, E.7
  • 29
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • Springer, Berlin/Heidelberg
    • Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography PKC 2011. Lecture notes in computer science, vol 6571. Springer, Berlin/Heidelberg, pp 53-70
    • (2011) Public Key Cryptography PKC 2011. Lecture Notes in computer science , vol.6571 , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.