-
1
-
-
84939207682
-
-
Magnetu [Online]
-
Magnetu [Online]. Available: http://magnetu.com, 2013.
-
(2013)
-
-
-
2
-
-
84939155847
-
-
Tencent weibo [Online]
-
Tencent weibo [Online]. Available: http://t.qq.com/, 2013.
-
(2013)
-
-
-
3
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption, " in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
(2007)
Proc. IEEE Symp. Security Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
4
-
-
38049078557
-
Multi-authority attribute based encryption
-
M. Chase, "Multi-authority attribute based encryption, " in Proc. 4th Conf. Theory Cryptography, 2007, pp. 515-534.
-
(2007)
Proc. 4th Conf. Theory Cryptography
, pp. 515-534
-
-
Chase, M.1
-
6
-
-
79960871684
-
Secure friend discovery in mobile social networks
-
W. Dong, V. Dave, L. Qiu, and Y. Zhang, "Secure friend discovery in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 1647-1655.
-
(2011)
Proc. IEEE INFOCOM
, pp. 1647-1655
-
-
Dong, W.1
Dave, V.2
Qiu, L.3
Zhang, Y.4
-
7
-
-
35048820609
-
Efficient private matching and set intersection
-
M. J. Freedman, K. Nissim, and B. Pinkas, "Efficient private matching and set intersection, " in Proc. Int. Conf. Theory Appl. Cryptographic Techn., 2004, pp. 1-19.
-
(2004)
Proc. Int. Conf. Theory Appl. Cryptographic Techn.
, pp. 1-19
-
-
Freedman, M.J.1
Nissim, K.2
Pinkas, B.3
-
8
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data, " in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
10
-
-
84948451182
-
A secure protocol for computing dot-products in clustered and distributed environments
-
I. Ioannidis, A. Grama, and M. Atallah, "A secure protocol for computing dot-products in clustered and distributed environments, " in Proc. IEEE Int. Conf. Parallel Process., 2002, p. 379.
-
(2002)
Proc. IEEE Int. Conf. Parallel Process.
, pp. 379
-
-
Ioannidis, I.1
Grama, A.2
Atallah, M.3
-
11
-
-
84883089676
-
Privacy-preserving data aggregation without secure channel: Multivariate polynomial evaluation
-
T. Jung, X. Mao, X.-Y. Li, S. Tang, W. Gong, and L. Zhang, "Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation, " in Proc. IEEE INFOCOM, 2013, pp. 2634-2642.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2634-2642
-
-
Jung, T.1
Mao, X.2
Li, X.-Y.3
Tang, S.4
Gong, W.5
Zhang, L.6
-
12
-
-
84919829652
-
Control cloud data access privilege and anonymity with fully anonymous attribute based encryption
-
T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Control cloud data access privilege and anonymity with fully anonymous attribute based encryption, " IEEE Trans. Inf. Forensics Security, 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
13
-
-
84927654398
-
Collusion-tolerable privacy-preserving sum and product calculation without secure channel
-
T. Jung and X.-Y. Li, "Collusion-tolerable privacy-preserving sum and product calculation without secure channel, " IEEE Trans. Dependable Secure Comput., 2014.
-
(2014)
IEEE Trans. Dependable Secure Comput.
-
-
Jung, T.1
Li, X.-Y.2
-
14
-
-
84883112893
-
Privacy preserving cloud data access with multi-authorities
-
T. Jung, X.-Y. Li, Z. Wan, and M. Wan, "Privacy preserving cloud data access with multi-authorities, " in Proc. IEEE INFOCOM, 2013, pp. 2625-2633.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2625-2633
-
-
Jung, T.1
Li, X.-Y.2
Wan, Z.3
Wan, M.4
-
16
-
-
79960878565
-
FindU: Privacy-preserving personal profile matching in mobile social networks
-
M. Li, N. Cao, S. Yu, and W. Lou, "FindU: Privacy-preserving personal profile matching in mobile social networks, " in Proc. IEEE INFOCOM, 2011, pp. 2435-2443.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2435-2443
-
-
Li, M.1
Cao, N.2
Yu, S.3
Lou, W.4
-
17
-
-
84883115549
-
Search me if you can: Privacy-preserving location query service
-
X.-Y. Li and T. Jung, "Search me if you can: Privacy-preserving location query service, " in Proc. IEEE INFOCOM, 2013, pp. 2760-2768.
-
(2013)
Proc. IEEE INFOCOM
, pp. 2760-2768
-
-
Li, X.-Y.1
Jung, T.2
-
18
-
-
84879157826
-
Privacy vulnerability of published anonymous mobility traces
-
Jun
-
C. Y. Ma, D. K. Yau, N. K. Yip, and N. S. Rao, "Privacy vulnerability of published anonymous mobility traces, " IEEE/ACM Trans. Netw., vol. 21, no. 3, pp. 720-733, Jun. 2013.
-
(2013)
IEEE/ACM Trans. Netw.
, vol.21
, Issue.3
, pp. 720-733
-
-
Ma, C.Y.1
Yau, D.K.2
Yip, N.K.3
Rao, N.S.4
-
20
-
-
45849129824
-
Ranking of closeness central-ity for large-scale social networks
-
K. Okamoto, W. Chen, and X.-Y. Li, "Ranking of closeness central-ity for large-scale social networks, " in Proc. 2nd Annu. Int. Workshop Frontiers Algorithmics, 2008, pp. 186-195.
-
(2008)
Proc. 2nd Annu. Int. Workshop Frontiers Algorithmics
, pp. 186-195
-
-
Okamoto, K.1
Chen, W.2
Li, X.-Y.3
-
23
-
-
78651281054
-
Enabling social networking in ad hoc networks of mobile phones
-
E. Sarigol, O. Riva, P. Stuedi, and G. Alonso, "Enabling social networking in ad hoc networks of mobile phones, " Proc. VLDB Endowment, vol. 2, pp. 1634-1637, 2009.
-
(2009)
Proc. VLDB Endowment
, vol.2
, pp. 1634-1637
-
-
Sarigol, E.1
Riva, O.2
Stuedi, P.3
Alonso, G.4
-
24
-
-
0035412925
-
Normalization of non-standard words
-
R. Sproat, A. W. Black, S. Chen, S. Kumar, M. Ostendorf, and C. Richards, "Normalization of non-standard words, " Comput. Speech Language, vol. 15, no. 3, pp. 287-333, 2001.
-
(2001)
Comput. Speech Language
, vol.15
, Issue.3
, pp. 287-333
-
-
Sproat, R.1
Black, A.W.2
Chen, S.3
Kumar, S.4
Ostendorf, M.5
Richards, C.6
-
25
-
-
0036999904
-
The resurrecting duckling: Security issues for ubiquitous computing
-
Apr
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ubiquitous computing, " IEEE Comput., vol. 35, no. 4, pp. 22-26, Apr. 2002.
-
(2002)
IEEE Comput.
, vol.35
, Issue.4
, pp. 22-26
-
-
Stajano, F.1
Anderson, R.2
-
26
-
-
79960856007
-
Relationship classification in large scale online social networks and its impact on information
-
S.-J. Tang, J. Yuan, X. Mao, X.-Y. Li, W. Chen, and G. Dai, "Relationship classification in large scale online social networks and its impact on information, " in Proc. IEEE INFOCOM, 2011, pp. 2291-2299.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2291-2299
-
-
Tang, S.-J.1
Yuan, J.2
Mao, X.3
Li, X.-Y.4
Chen, W.5
Dai, G.6
-
27
-
-
56749173469
-
VENETA: Serverless friend-of-friend detection in mobile social networking
-
M. Von Arb, M. Bader, M. Kuhn, and R. Wattenhofer, "VENETA: Serverless friend-of-friend detection in mobile social networking, " in Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun., 2008, pp. 184-189.
-
(2008)
Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun.
, pp. 184-189
-
-
Von Arb, M.1
Bader, M.2
Kuhn, M.3
Wattenhofer, R.4
-
28
-
-
77955912474
-
E-smalltalker: A distributed mobile system for social networking in physical proximity
-
Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, "E-smalltalker: A distributed mobile system for social networking in physical proximity, " in Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst., 2010, pp. 468-477.
-
(2010)
Proc. IEEE 30th Int. Conf. Distrib. Comput. Syst.
, pp. 468-477
-
-
Yang, Z.1
Zhang, B.2
Dai, J.3
Champion, A.C.4
Xuan, D.5
Li, D.6
-
29
-
-
77954845334
-
Privacy and security for online social networks: Challenges and opportunities
-
Jul./Aug
-
C. Zhang, J. Sun, X. Zhu, and Y. Fang, "Privacy and security for online social networks: Challenges and opportunities, " IEEE Netw., vol. 24, no. 4, pp. 13-18, Jul./Aug. 2010.
-
(2010)
IEEE Netw.
, vol.24
, Issue.4
, pp. 13-18
-
-
Zhang, C.1
Sun, J.2
Zhu, X.3
Fang, Y.4
-
30
-
-
84929203901
-
Mechanism design for finding experts using locally constructed social referral web
-
L. Zhang, X.-Y. Li, J. Lei, J. Sun, and Y. Liu, "Mechanism design for finding experts using locally constructed social referral web, " IEEE Trans. Parallel Distrib. Syst., 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
-
-
Zhang, L.1
Li, X.-Y.2
Lei, J.3
Sun, J.4
Liu, Y.5
-
31
-
-
77955046278
-
Wiface: A secure geosocial networking system using wifi-based multi-hop manet
-
L. Zhang, X. Ding, Z. Wan, M. Gu, and X.-Y. Li, "Wiface: A secure geosocial networking system using wifi-based multi-hop manet, " in Proc. 1st ACM Workshop Mobile Cloud Comput. Services: Social Net. Beyond, 2010, p. 3.
-
(2010)
Proc. 1st ACM Workshop Mobile Cloud Comput. Services: Social Net. Beyond
, pp. 3
-
-
Zhang, L.1
Ding, X.2
Wan, Z.3
Gu, M.4
Li, X.-Y.5
-
32
-
-
84939168747
-
-
arXiv preprint arXiv: 1410.6593
-
L. Zhang, T. Jung, P. Feng, X.-Y. Li, and Y. Liu, "Cloud-based privacy preserving image storage, sharing and search, " arXiv preprint arXiv:1410.6593, 2014.
-
(2014)
Cloud-based Privacy Preserving Image Storage, Sharing and Search
-
-
Zhang, L.1
Jung, T.2
Feng, P.3
Li, X.-Y.4
Liu, Y.5
-
33
-
-
84939155348
-
-
arXiv preprint arXiv: 1410.6589
-
L. Zhang, T. Jung, C. Liu, X. Ding, X.-Y. Li, and Y. Liu, "Outsource photo sharing and searching for mobile devices with privacy protection, " arXiv preprint arXiv:1410.6589, 2014.
-
(2014)
Outsource Photo Sharing and Searching for Mobile Devices with Privacy Protection
-
-
Zhang, L.1
Jung, T.2
Liu, C.3
Ding, X.4
Li, X.-Y.5
Liu, Y.6
-
34
-
-
84883129081
-
Verifiable private multiparty computation: Ranging and ranking
-
L. Zhang, X.-Y. Li, Y. Liu, and T. Jung, "Verifiable private multiparty computation: Ranging and ranking, " in Proc. IEEE INFO-COM, 2013.
-
(2013)
Proc. IEEE INFO-COM
-
-
Zhang, L.1
Li, X.-Y.2
Liu, Y.3
Jung, T.4
-
35
-
-
84861649075
-
Fine-grained private matching for proximity-based mobile social networking
-
R. Zhang, Y. Zhang, J. Sun, and G. Yan, "Fine-grained private matching for proximity-based mobile social networking, " in Proc. IEEE INFOCOM, 2012, pp. 1969-1977.
-
(2012)
Proc. IEEE INFOCOM
, pp. 1969-1977
-
-
Zhang, R.1
Zhang, Y.2
Sun, J.3
Yan, G.4
-
36
-
-
84865612170
-
Sharp: Private proximity test and secure handshake with cheat-proof location tags
-
Y. Zheng, M. Li, W. Lou, and Y. T. Hou, "Sharp: Private proximity test and secure handshake with cheat-proof location tags, " in Proc. Eur. Symp. Res. Comput. Security, 2012, pp. 361-378.
-
(2012)
Proc. Eur. Symp. Res. Comput. Security
, pp. 361-378
-
-
Zheng, Y.1
Li, M.2
Lou, W.3
Hou, Y.T.4
|